
Israeli Hackers Hack Back…Guess What They Were Able To Infiltrate
Israeli hackers broke into the computers of Anonymous members that attacked Israel a few days ago, led them to the computer, photographed them and showed them the message: “Hey, next time do not take part in an offensive against Israel. We know who you are, we know where you are. Praise Israel.” The images and their full details are published on the web. A security expert said “Israel’s exposure shows a very high level of sophistication”
By Yair Mor
A failed attack by members of Anonymous against Israel earlier this week led Israeli hackers to make an offensive, publicly revealing the faces of some participants in the anti-Israel attack.
Wednesday morning the hacker team published an “Israeli Elite Force” document with details of 16 Internet users from around the world that allegedly participated in OpIsrael, which was organized by an anti-Israeli network. The document shows the details of the attack participants, including names, country of origin and usernames and passwords to various websites they use. Most participants came from Malaysia and Indonesia, while others scattered around Portugal, the UK, Italy, Switzerland, Finland, Algeria and Saudi Arabia.
Smile for the webcam
The hacker who carried out the counterattack, and called himself Buddhax, managed to infiltrate the computers of participants, capture screenshots and in some cases their pictures with webcams on their computers.
He said it was not very complicated, and that it is proof of how Anonymous anti-Israeli attackers are amateurs. “I’m not a great hacker, but I’m at least good enough to expose you,” he wrote. After he got to their the computer screens, he warned them against future participation in similar operations: “Hey, next time do not take part in an offensive against Israel. We know who you are, we know where you are. Praise Israel.”
Lior Pollack, CTO of information security at 2BSecure, said to NEXTER that the “exposure carried out by a team of hackers shows that the level of sophistication is very high as shown by the use of advanced tools to reach PC attackers to obtain information, photographs from their cameras through a Trojan horse. It’s not easy, they had to lure the attackers to press all kinds of links to get the Trojan horse in,” he stressed, adding that “there is a challenge even in recognizing which tools used can be accessed. Their methods suggests they are much more sophisticated and experienced than those attacking from OpIsrael, who are basically just kids who do basic things.”
For the rest of this fantatsic article, click GEEK TIME
