Quote from: bitewerksMTB on August 06, 2013, 02:00:15 AM
Researching Op.Darknet, everything I read is from 2011 with user names from Lolita City posted on PasteBin.
Yea it may have a different name now, but how I understand it, it is just a continuous name they are using for the outing of said lists and will use the same Operations name on this up-and-coming list. But yes the last list they made was 2011.
BBC is picking up on the story:
http://www.bbc.co.uk/news/technology-23573048QuoteThe .js on the compromised Tor sites (which I have little doubt included illegal material) phoned home user IPs to Reston, VA according to Vlad Tsrklevich.
I'm not a Java Script programmer (Python, Perl, PHP and of course bash are what I know) but from looking over it it seems like a pretty cut-and-dry, ugly code. For the exploit to work you have to 1 be using windows, 2 be using that bundle, 3 have java enabled and 4 NoScript set to *allow* scripts, and of course visit the exploited sites within the small time frame.
From the reverse engineers and blackhats that have been working through the code we have come to understand this isn't the FBI, rather the NSA and SAIC. Who the fuck are they? This fits nicely with the topic of this thread now...
http://pop.robtex.com/nsa.gov.html#recordsThat IP address is part of IP space directly allocated to the NSA's Autonomous Systems (AS). It's not FBI; it's NSA. And why was that IP address just there for everyone to see? One simply does not write hand-obfuscated code like that and then put one's IP:80 in plain view. The placement was certainly intentional. What the security world is thinking is this is some sort of "psyops" shit; FUD on meth". They want to scare you off Tor, scare you off all privacy services. They want people to feel vulnerable, insecure, uncertain, they want them to doubt everything they think they know about online security.
I don't know what I believe yet, but in any case the questions that needs to be asked is, what the fuck is an NSA IP address doing as a command & control contact for javascript malware being deployed in the torsploit attack?