milw0rm

From Wikipedia, the free encyclopedia
Milw0rm
Formation1998
Membership
JF, Keystroke, ExtreemUK, savec0re, and VeNoMouS

Milw0rm is a group of hacktivists[1] best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Mumbai, the primary nuclear research facility of India, on June 3, 1998.[2] The group conducted hacks for political reasons,[3] including the largest mass hack up to that time, inserting an anti-nuclear weapons agenda and peace message on its hacked websites.[4][5] The group's logo featured the slogan "Putting the power back in the hands of the people."[6]

The BARC attack generated heated debate on the security of information in a world prevalent with countries developing nuclear weapons and the information necessary to do so, the ethics of "hacker activists" or "hacktivists," and the importance of advanced security measures in a modern world filled with people willing and able to break into insecure international websites.

The exploit site milw0rm.com and str0ke are unaffiliated with the milw0rm hacker group.

Members[edit]

Little is known about the members of milw0rm, which is typical of hacking groups, which often conceal members' identities to avoid prosecution.[7] The international hacking team "united only by the Internet"[citation needed][8] was composed of teenagers[9] who went by the aliases of JF, Keystroke, ExtreemUK, savec0re, and VeNoMouS.[10] VeNoMouS, 18, hailed from New Zealand, ExtreemUK and JF, 18, from England, Keystroke, 16, from the US and Savec0re, 17, from the Netherlands.

JF went on to achieve a modicum of notoriety when MTV "hacked" its own website intentionally and graffitied the words "JF Was Here" across the page,[11] at the same time that JF was under investigation for the milw0rm attacks by Scotland Yard.[12] Hundreds of pages hosted on MTV.com sported the new JF logo, including one page that read, "JF was here, greets to milw0rm".[13] MTV later confirmed that the alleged JF "hack" was a publicity stunt to promote the appearance of a commentator named Johnny Fame at the 1998 MTV Video Music Awards.[12] Many were puzzled by the apparent hack committed by JF since the hacker was "known for relatively high ethical standards."[12]

VeNoMouS claimed that he learned to crack into systems from Ehud Tenenbaum, an Israeli hacker known as The Analyzer.[14]

BARC attack[edit]

On the night of June 3, 1998, the group used a US military .mil machine to break into the LAN of BARC and gained root access. The group gained access to five megabytes of confidential emails and documents. These emails included correspondence between the center's scientists relating to the development of nuclear weapons. Savec0re erased all the data on two servers as a protest against the center's nuclear capabilities. They changed the center's webpage to display a mushroom cloud along with an anti-nuclear message and the phrase "Don't think destruction is cool, coz its not".[14][15]

The group of teenagers were from the United States, United Kingdom and New Zealand.[16]

Milw0rm then came forward with the security flaws they exploited in BARC's system, along with some of the thousands of pages of documents they had lifted from the server, concerning India's last five nuclear detonations.

After the attack Keystroke claimed that the breach had taken "13 minutes and 56 seconds" to execute. Though it was later reported that Keystroke meant this as a lighthearted answer. The invasion took careful planning, routing through servers throughout the world from three different continents, and took days to execute.[17]

Attack aftermath[edit]

The security breach was first reported by Wired News. JF and VeNoMouS claimed credit by emailing Wired reporter James Glave with documents they had obtained from the BARC servers as proof.[15]

After first denying that any incident had occurred, BARC officials admitted that the center had indeed been hacked and emails had been downloaded. It was reported that the security flaw resulted from "a very normal loophole in Sendmail". Forbes wrote that perhaps up to 100 hackers had followed milw0rm's footsteps into the BARC servers once they were revealed as insecure.[18] The website was shut down while its security was upgraded.[15] BARC officials said that none of the emails contained confidential information, the group did not destroy data, and that the computers they have that contain important data were isolated from the ones broken into.[17]

The milw0rm attack caused other groups to heighten their security to prevent invasion by hackers. The U.S. Army announced, without giving evidence as to why they believed this to be the case, that the hacks might have originated in Turkey.[15]

Later, Khalid Ibrahim approached members of milw0rm and attempted to buy classified documents from them. According to savec0re, Ibrahim threatened to kill him if the hacker did not turn over the classified documents in question.[19] Savec0re told Kevin Mitnick that Ibrahim first approached him posing as a family member of an FBI agent who could grant immunity to the members of milw0rm.[20]

The Electronic Disturbance Theater released a statement in support of JF, applauding him for his hacktivism and maintaining that computer break-ins of this sort were not cyber-terrorism as some claim.[21]

Other attacks[edit]

One month after the BARC incident, in July 1998, milw0rm hacked the British web hosting company Easyspace, putting their anti-nuclear mushroom cloud message on more than 300 of Easyspace's websites,[22] along with text that read: "This mass takeover goes out to all the people out there who want to see peace in this world."[23]

Wired reported that this incident was perhaps the "largest 'mass hack' ever undertaken."[23] The United States Department of Defense adviser John Arquilla later wrote that it was one of the largest hacks ever seen.[24] Some of the sites hacked in the incident were for the World Cup, Wimbledon, the Ritz Casino, Drew Barrymore, and the Saudi royal family.[23] The text placed on the sites read in part, "This mass takeover goes out to all the people out there who want to see peace in this world... This tension is not good, it scares you as much as it scares us. For you all know that this could seriously escalate into a big conflict between India and Pakistan and possibly even World War III, and this CANNOT happen... Use your power to keep the world in a state of PEACE."[25]

While scanning a network for weaknesses, members of the group came across EasySpace, a British company which hosted many sites on one server. Along with members of the fellow hacking group Ashtray Lumberjacks,[6] milw0rm had the revised mushroom cloud image and text on all of Easyspace's websites in less than one hour.[23] Vranesevich said that the mass hack was rare in its effect and its intention: the hackers seemed to be more interested in political purposes than exposing computer security flaws.[23]

It was also reported that milw0rm broke into a Turkish nuclear facility in addition to BARC.[26]

See also[edit]

References[edit]

  1. ^ "'Hacktivists' of All Persuasions Take Their Struggle to the Web". New York Times. October 31, 1998.
  2. ^ Milworm Bites BARC outlookindia.com. Retrieved 30 December 2012
  3. ^ Margolis, Michael; David Resnick (2000). Politics As Usual. Sage Publications. p. 195. ISBN 0-7619-1330-0.
  4. ^ Wall, David; William L. Simon (2001). Crime and the Internet. London: Routledge. p. 65. ISBN 0-415-24429-3.
  5. ^ Himma, Kenneth Einar (2006). Internet security. Jones & Bartlett Publishers. pp. 64–65. ISBN 0-7637-3536-1.
  6. ^ a b "E-Guerrillas in the mist". Ottawa Citizen. October 27, 1998.
  7. ^ Himma, Kenneth Einar (2006). Internet security. Jones & Bartlett Publishers. p. 92. ISBN 0-7637-3536-1.
  8. ^ Smallridge, Joshua (2016). "Understanding Cyber-Vigilantism: A Conceptual Framework". Journal of Theoretical & Philosophical Criminology. 8: 57–70. ProQuest 1787752058 – via ProQuest.
  9. ^ Rashtriya Sahara. India: Sahara India Mass Communication. 1996.
  10. ^ Boni, William C.; Gerald L. Kovacich (1999). I-way robbery. Butterworth-Heinemann. p. 142. ISBN 0-7506-7029-0.
  11. ^ "MTV "hack" backfires". CNet. September 9, 1998. Archived from the original on 2012-11-04.
  12. ^ a b c "MTV Cries 'Hacked!'". Wired. September 9, 1998.
  13. ^ "AntiOnline's Editorial Coverage Of The MTV Site "Hack" ?". AntiOnline. September 1998. Archived from the original on 1998-12-05.
  14. ^ a b "Crackers: We Stole Nuke Data". Wired. June 3, 1998.
  15. ^ a b c d "India has scary nuke hack". ZDNet. June 5, 1998.
  16. ^ Liang, Qiao; Al Santoli (2002). Unrestricted warfare. NewsMax Media. p. 35. ISBN 0-9716807-2-8.
  17. ^ a b "The Eye of the Needle". Rediff. June 9, 1998.
  18. ^ "Hacking Bhabha". Forbes. November 16, 1998.
  19. ^ "Do Terrorists Troll the Net?". Wired. November 4, 1998.
  20. ^ Mitnick, Kevin; William L. Simon (2005). The Art of Intrusion. John Wiley and Sons. p. 33. ISBN 0-7645-6959-7.
  21. ^ "The Electronic Disturbance Theater supports "JF" the young british anti-nuclear hacker". The Electronic Disturbance Theater. July 8, 1998.
  22. ^ Boni, William C.; Gerald L. Kovacich (1999). I-way robbery. Butterworth-Heinemann. p. 130. ISBN 0-7506-7029-0.
  23. ^ a b c d e "Anti-Nuke Cracker Strikes Again". Wired. July 3, 1998.
  24. ^ Arquilla, John; David F. Ronfeldt (2001). Networks and netwars. Rand Corporation. p. 273. ISBN 0-8330-3030-2.
  25. ^ "Cyberwarriors: Activists and Terrorists Turn to Cyberspace". The Future of War. Summer 2001.
  26. ^ Defensor Pacis. The Institute. 1999.

External links[edit]

Mirrors of hacked sites[edit]