Ghost Squad Hackers Leaked Personal Info Of Israel Defence Forces

“Ghost Squad Hackers Leaked Personal Info Of Israel Defence Forces”. The first attack of #OpIsrael started in 2013 when certain branches of the Anonymous hacker collective decided to launch coordinated cyber attacks against Israeli websites on the eve of the Holocaust Remembrance Day, which that year fell on April 8.

Ever since then, the group has been launching similar operations each year, on the same date, and in a recent statement posted on one of its websites, it has said it will continue in 2016 as well. In spite of the fact that, this year, Holocaust Remembrance Day is on May 4, the attacks will still take place on April 7.

Talking to HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group, told that the group Hacked and Leaked Information of Israel Defence Forces at “https://ghostbin.com/paste/m9vxe.

In the leaked information dox, they provided a release of 8,000 IDF family members Phone numbers, Full names and 10,000 personal emails they’ve also included 1000 Israeli IDF soldiers facebook accounts, Israeli Air Force Facebook accounts, and Israeli border Police/Patrol Facebook accounts, And Credit Cards belonging to Israeli IDF family members and IDF soldiers. They have also provided Commanders of Israeli Air Force, Commanders at Israeli Defense Forces. This Data release is in retaliation to the ongoing slaughter and genocide and atrocities committed on the Palestinian people, by the Israeli government set out to conquer Palestine in imperialistic methods of genocide.

Below Are The Sights Of Some Leaked Data.

Important Israeli Targets

Israeli Air Force Pilots and gov Officials list

Israeli Border Police and Patrol

1000 IDF Soldiers

Israeli Credit Cards leaked

Israeli phone number emails leaked

Watch the group’s most recent video on Isreal Cyber Attack here at HACKAGON and follow the conversation across social media at #OpIsreal.

We hope that HACKAGON provided a knowledgeable article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.


opTrump Anonymous Declared War against Donald Trump

The Anonymous Group Ghost Squad Hackers Took Down Trumps Websites. “#opTrump – Anonymous Declared War against Donald Trump.” Hacktivist collective Anonymous has threatened to take down 2016 presidential hopeful Donald Trump, this time declaring “Total War” on the GOP frontrunner. Anonymous’ war plan against Trump includes dismantling the candidate’s online presence and digging for dirt on the business tycoon in an attempt to destroy his brand.

According to a video posted on YouTube on March 4th, this plan of attack includes a specific timeline. April 1 was the takedown date for TrumpChicago.com, and Anonymous recruited and still recruiting supporters to aid in its attack.

“Donald Trump, think twice before you speak anything, Said a masked member of Anonymous in a video at the time. “You have been warned.”

In that video, the Anonymous representative makes clear that the group is welcoming all willing participants to join in the group’s so-called war on Trump — with or without hacking experience. “This is a call to protect our future, our freedom and our very way of life,” Reads the hacktivist group member during the video.

Talking to HACKAGON, A member of Ghost Squad Hackers, an Anonymous-Affiliated Group that hacked Ethiopian websites in response to the killing of protesting students, told that the group took down Donald Trump‘s 2 websites “Trump.com” and “trumphotelcollection.com” hosted on CloudFlare and flooded it with DDoS Attacks.

Below is the sight of Attacked “Trump.com” “Trumphotelcollection.com”

trump.com

trumphotelcollection.com

Anonymous’ words for Donald Trump: “Dear Donald Trump, we have been watching you for a long time and what we see is deeply disturbing, Your inconsistent and the hateful campaign has not only shocked the United States of America, you have shocked the entire planet with your appalling actions and ideas.”

Additionally, the group is also aiming to hack some US-based websites — including some famous universities — to send a message to Donald Trump. The hacker told, “The reason we choose universities is, to let the generation know what they are up against and what kind of leader will lead them,”.

It would appear that Anonymous is now ready to scale up its efforts to dismantle Trump’s candidacy, this time with a clearer plan of attack. Watch the group’s most recent video on Trump here at HACKAGON and follow the conversation across social media at #OpTrump.

https://www.youtube.com/watch?v=Ciavyc6bE7A

We hope that HACKAGON provided a knowledgebale article to our multitude readers. so, if you like this article then don’t forget to share it with your friends and always feel free to drop a comment below if you have any query or feedback.

 


SMS spoofing is a relatively new technology which uses the Short Message Service (SMS), available on most mobile phones and personal digital assistants, to set who the message appears to come from by replacing the originating mobile number (Sender ID) with alphanumeric text. Spoofing has both legitimate uses (setting the company name from which the message is being sent, setting your own mobile number, or a product name) and illegitimate uses (such as impersonating another person, company, product).

About SMS Spoofing and How it’s Done:

SMS Spoofing occurs when a sender manipulates address information. Often it is done to impersonate a user that has roamed onto a foreign network and is submitting messages to the home network. Frequently, these messages are addressed to destinations outside the home network – with the home SMSC essentially being “hijacked” to send messages to other networks.

The impact of this activity is threefold:

  • The home network can incur termination charges caused by the delivery of these messages to interconnect partners. These messages can be of concern to interconnect partners. Their customers may complain about being spammed, or the content of the messages may be politically sensitive. Interconnect partners may threaten to cut off the home network unless a remedy is implemented. Home subscribers will be unable to send messages to these networks.
  • While fraudsters normally used spoofed-identities to send messages, there is a risk that these identities may match those of real home subscribers. The risk, therefore, emerges, those genuine subscribers may be billed for roaming messages they did not send. If this situation occurs, the integrity of the home operator’s billing process may be compromised, with potentially huge impact on the brand.

The legitimate use cases for SMS spoofing include:

  • A sender transmits an SMS message from an online computer network for lower more competitive pricing, and for the ease of data entry from a full-size console. They must spoof their own number to properly find themselves.
  • A sender does not have a mobile phone, and they need to send an SMS from a number that they have provided the receiver in advance to activate an account.
  • A sender adopts the default network gateway identifier provided by an online service, to send an anonymous SMS, not specifying the number of their own choosing.
  • A third-party sends a message to a virtual number, which then forwards (resend) the message to one or more recipients in such a way that the true originator address (rather than the virtual number) appears as the sender ID and the recipient(s) can reply, call, sort, save, or otherwise process the message in an expected way.

An SMS Spoofing attack is often first detected by an increase in the number of SMS errors met during a bill run. These errors are caused by the spoofed subscriber identities. Operators can respond by blocking different source addresses in their Gateway-MSCs, but fraudsters can change addresses easily to bypass these measures. If fraudsters move to using source addresses at a major interconnect partner, it may become unfeasible to block these addresses, due to the potential impact on normal interconnect services.

 Sites That Offer Text Message Spoofing:

Below listed are some sites that have, or do, offer SMS spoofing services:

  1. Send Anonymous SMS: http://www.sendanonymoussms.com
  2. TxtEmNow: http://txtemnow.com
  3. TextEm: http://www.textem.net
  4. Text For Free: http://textforfree.net
  5. TxtDrop:  http://www.txtdrop.com
  6. SMS Anonymous (For Australians): https://smsanonymous.herokuapp.com
  7. SMS Spoofing: http://www.smsspoofing.com
  8. Spoof Card: http://www.spoofcard.com
  9. Spoof Texting: http://www.spooftexting.com
  10. Fake My Text: http://www.fakemytext.com
  11. The SMS Zone: http://www.thesmszone.com

The Legality of SMS Spoofing:

The legality of SMS spoofing has been brought to our attention many times. In 2007, The UK premium rate regulator, PhonepayPlus (formerly ICSTIS) concluded a public consultation on anonymous SMS, where they stated they were not averse to the operation of such services. However, in 2008 PhonePayPlus introduced new regulation covering anonymous SMS, requiring anonymous SMS service providers to send a follow-up message to the recipient stating that a spoofed SMS has been sent to them, and use a complaints helpline. It is illegal to send anonymous SMS messages in Australia. We have heard that many countries across Europe and Asia have actually passed laws making it illegal to spoof text messages. We are confident that text message spoofing is NOT illegal under any existing laws in the United States.

Note: – This guide is only for knowledge purpose and shouldn’t be used for any illegal activities as we are not responsible for anything happens with this.

Hope you like this article. So, don’t forget to share it with your friends and feel free to drop a comment below if you still face any kind of problem.