More than 30 countries were hacked in 2012 - by (an informant under control of) “the FBI”
in US Court proceedings it has become clear that the FBI has been directing Cybersecurity attacks. We know that the NSA have been doing this via the Snowden allegations, but for this FBI led-attack - we know this not via ‘allegations’ but through (sealed & censored) US court documents which have now been reverse-engineered.
According to Court documents the FBI asked Hector Xavier Monsegur (with a pseudonym of Sabu) on June 8, 2011 to persuade hacker colleagues in the ‘Anonymous-style' “LulzSec"community to attack internet targets. (The Economist referred to Sabu as one of LulzSec's six core members and their "most expert” hacker) The FBI provided him the list of countries & facilities to attack.
from http://www.dailydot.com/politics/fbi-hammond-sabu-hack-country-list/
More than 30 countries were hacked in 2012 - by (an informant under control of) “the FBI”
A Federal Bureau of Investigation (FBI) informant targeted more than two dozen countries in a series of high-profile cyberattacks in 2012. The names of many of those countries have remained secret, under seal by a court order—until now.
Brazil,
Netherlands, (EU, NATO)
Belgium, (EU, NATO)
United Kingdom, (EU, NATO, 5-EYES)
Australia, (5-EYES)
Papua New Guinea,
Republic of Maldives,
Philippines,
Laos,
Libya,
Turkey, (NATO)
Sudan,
India,
Malaysia,
South Africa,
Yemen,
Iraq,
Saudi Arabia,
Trinidad and Tobago,
Lebanon,
Kuwait,
Albania,
Bosnia and Herzegovina,
Argentina
including national government sites in
Libya,
Yemen,
Sudan,
Philippines,
Iran,
United Kingdom (EU, NATO, 5-EYES)
Nigeria,
Republic of Maldives,
Paraguay,
Saint Lucia,
Puerto Rico.
Iran,
Greece, (EU, NATO)
Slovenia, (EU)
United States, (NATO, 5-EYES)
This list targeted Databases which containing the login credentials, financial details, and private emails of foreign citizens, and in some cases government agents. This data was exfiltrated by hackers tasked by Monsegur to do as much damage as possible. After they stole the data, it was routinely uploaded, at Monsegur’s instruction, to a server under the FBI’s control, according to court statements. [My speculation is that the NSA will have then further exploited these databases & compromised systems, under cover of Anonymous/LulzSec]
Monsegur played a crucial role in staging high-profile (False-Flag) cyberattacks against FBI security contractor ManTech, and the Texas intelligence firm Stratfor, [in which my personal details were leaked!] The FBI attempted to use Monsegur to entrap Nadim Kobeissi, author of the secure communication software Cryptocat, but without success, but Monsegur continued working online for the FBI until March 6, 2012 when he was arrested, with 2 British & 2 Irish citizens.
The court-case where Monsegur was prosecuted & sentenced to 1 year suspended sentence (including 7 months pre-trail detention) claimed that he was successful as an FBI informant to protect the USA from over 300 cybersecurity attacks between 2011 to 2014, including NASA, dot MIL & media companies. The court mentioned that he had made some attacks but the list of countries/targets was censored and sealed, until DailyDot analysed them..