Australian government websites taken offline by Anonymous
- 24 July, 2012 14:37
Members of hacktivist group Anonymous have claimed credit for taking down 10 Queensland government websites earlier this week in response to proposed changes to data retention laws currently under discussion by the Parliamentary Joint Committee on Intelligence and Security (PJCIS).
The PJCIS inquiry is considering reform proposals for telecommunications interception, telecommunications sector security and Australian intelligence community legislation.
One of the proposals includes "tailored data retention periods for up to two years for parts of a data set", with every internet users' entire Web history logged and stored for up to two years.
According to a blog posting entitled Par:AnoIA Queensland, members of the group used an authentication bypass to loot some “booty” from Queensland government servers which, according to Anonymous, showed how the Australian government was monitoring citizen's activity online.
Acording to a Twitter account called OperationAustralia, the attacks began on 21 July. The latest message reads: "Be Prepared Australia! Something BIG is heading your way."
Previous messages listed the websites attacked and also requested a chat with Australian Prime Minister, Julia Gillard, about the proposed data retention laws.
The defacement message posted on the Queensland government websites which were taken down read: "Welcome Australian Boys and Girls. You may have heard about the proposed National Security changes: You probably don't like them: We certaintly don't."
"Do you like the idea of surrending your passwords or people spying on your Twitter or Facebook account? Nope, we didn't think you did."
"Your government seems to think everybody in Australia is a terrorist. Do you still want to believe in your paranoid leaders? If we were Australia, we sure wouldn't."
The original message can be found at Gizmodo.
The websites, which have now been restored, included:
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Larry Page wants to see your medical records
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Real-Time Protection Against Malware Infection
Malware is at such high levels (more than 60 million unique samples per year) that protecting an endpoint with traditional antivirus software, has become futile. More than 100,000 new types of malware are now released every day, and antivirus vendors are racing to add new protection features to try to keep their protection levels up. Read more.
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Cloud Computing for Midsize Businesses: Delivering Innovation and Efficiency
It’s time for midsize companies to start thinking differently about infrastructure. This white paper provides a brief overview of cloud computing, explains how midsize companies can benefit, and describes the steps they can take to take advantage of what it has to offer. Read now.