Categories: IntelligenceMalware

GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec

New slides leaked by Snowden, and published by NBC NEWS, reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.

The last revelation on the investigation conducted by NBC News on Snowden case reveals that British intelligence GCHQ ran denial-of-service attacks against Anonymous and LulzSec. Documents leaked by the NSA whistleblower Edward Snowden reports the existence of a GCHQ unit known as the Joint Threat Research Intelligence Group (JTRIG) that ran DoS attack against chatrooms used by hacktivists. It is the first time that is mentioned the secret unit, the existence of JTRIG has never been previously disclosed publicly.

The leaked slides contains a dedicated page that mentions the Rolling Thunder operation operated by JTRIG, the document erroneously reports a “DDoS” attack instead a DoS.

The state-sponsored hackers hit Anonymous and LulzSec, the offensive campaign was codenamed  Rolling Thunder, the attackers used a packet flood technique to break down the adversaries.

“The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder — and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms.” NBC reports.

GCHQ spies also infiltrated the chat rooms for Intelligence purpose, the British agents in this way have identified a hacktivist who has stolen confidential data from PayPal and also another member who had participated in attacks against government websites.

Intelligence sources in the past referred that in 2011, authorities were alarmed by a wave of cyber attacks on government and corporate websites, so they decided to go on the attack.

“While there must of course be limitations,”  “law enforcement and intelligence officials must be able to pursue individuals who are going far beyond speech and into the realm of breaking the law: defacing and stealing private property that happens to be online.” “No one should be targeted for speech or thoughts, but there is no reason law enforcement officials should unilaterally declare law breakers safe in the online environment,” said Michael Leiter, the former head of the U.S. Government’s National Counterterrorism Center and now an NBC News analyst.

The GCHQ offensive operation started in September 2011, in that period, both groups LulzSec and Anonymous were very active, in December of the same year Anonymous group violated the systems of Stratfor Intelligence firm. Hacktivists from collectives LulzSec ran a DDoS attack on the website of the Serious and Organised Crime Agency in June 2011 and on the US Central Intelligence Agency. LulzSec had also hacked InfraGard chapters’ websites, a non-profit organization linked to the FBI, email and database were leaked during the attack. Always in the same period the hacktivists bombarded website Senate.gov stealing internal data, and within the #OpPayback the hit PayPal and Mastercard websites who were guilty to block WikiLeaks banking transfers in 2010.

The presentation gives detailed examples of “humint” (human intelligence) on a collective of hacktivists known with pseudonymous G-Zero, Topiary and pOke, they were contacted by undercover GCHQ agents via IRC

All the chat session were recorded, following an extract of one of them:

“Anyone here have access to a website with at least 10,000+ unique traffic per day?” asks one hacktivist in a transcript taken from a conversation that began in an Operation Payback chat room. An agent responds and claims to have access to a porn website with 27,000 users per day. “Love it,” answers the hacktivist. The hackers ask for access to sites with traffic so they can identify users of the site, secretly take over their computers with malware and then use those computers to mount a DDOS attack against a government or commercial website. 

“In a transcript taken from a second conversation in an Operation Payback chat room, ahacktivist using the name “pOke” tells another named “Topiary” that he has a list of emails, phone numbers and names of “700 FBI tards.”

Edward Pearson is the person identified as GZero, a 25 year-old from York, who was convicted and sentenced to 26 months in prison for stealing information from 200,000 PayPal accounts. The investigators also discovered that Pearson and his then girlfriend used stolen credit card details to pay for a hotel stay. All the details of the investigation were reported in the leaked GCHQ presentation.

After the disclosure of the slides the advocates and security experts are questioning the legality of the operation ran by the GCHQ. Is it legal to hack back an attacker? What happens if the attacker is an intelligence agency and the target is the communication channel of a group of hacktivists like LulzSec and Anonymous?

(Security Affairs –  GCHQ, Anonymous, LulzSec)
Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Cryptocurrencies and cybercrime: A critical intermingling

As cryptocurrencies have grown in popularity, there has also been growing concern about cybercrime involvement…

36 mins ago

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

57 mins ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

3 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

5 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

16 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

23 hours ago

This website uses cookies.