Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Public

The Real Owner of OpenSC.ws?

Paul Anderson by Paul Anderson
June 19, 2012 - Updated on November 2, 2012
in Public, Technology News
21
Opensc Real Owners
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Opensc Real OwnersOpenSC.ws was recently hacked and the deface page was up for about a day or so,  the site is now down and the webmaster is no where to be found.  Many are wondering what was the motivation behind the individuals targeting OpenSC.ws (a “underground” programming forum).  After the original owners left, including Icarus (the owner of the forum at the time).  Icarus sold the forum to whoever would pay.  A user by the name of “Reine” helped contribute to the payment of OpenSC.ws (the community was told).

You might also like

Silent OS 3.0 for Blackphone Completely revamped

Megaupload Plans to Return After 5 Years

Exploit Kit activity on a steep decline since April

Now, none of this confirmed, but looking at the evidence it is believed Reine and Icarus are the same person, but who is the person behind these two accounts?

The end of 2011 OpenSC.ws released an Android and IPhone app to access their website with a GUI that was user friendly and allowed users to access the forums on the move.  The app was released and can now be found here.

If you look at the author of the app that Reine stated that he had coded, you will see a unfamiliar name:

 

Who is this Can YILDIZLI?  Well, if we do a quick Google search you come up with many links such as a LinkedIn account, Facebook and a couple articles of a competition.   One of the articles states:

Teams of 3 or 4 contestants from all over the world took part in the contest.  The challengers were members of leading computer technology companies, cyber war intelligence experts, teams from military and law enforcement, and IT experts of universities.

The objective of the challenge was to track hackers in cyberspace and crack codes to collect intelligence.  Can Yıldızlı joined the challenge alone under the alias “LoneWolf,” and cracked hundreds of codes to uncover the data hidden behind music and image files.  Yıldızlı kept track of professional hackers with the software he developed, and gathered a wealth of digital evidence.

The challenge is considered the largest and the longest competition in digital evidence collecting and intelligence.  The Pentagon aims to discover more talent in the field and encourage more IT experts to work in cyber defense.

The challenge began in January 2011, and contestants were given problems of varying difficulty for almost 1 year.

Speaking on collecting digital evidence, cracking codes and various issues in intelligence, Can Yıldızlı said: “I cracked a code placed in a digital image file to uncover the encrypted message.  I also tracked hackers to collect evidence of their criminal acts and identities.  I was the first among 1147 teams from 52 countries.  My competitors were usually teams of 4, while I competed as a ‘LoneWolf.’  At the end of the challenge, I took first place with 4789 points.  The first and second runners-up were teams of 4 people, and they only took around 3500 points.  Although I competed on my own, I was able to leave my closest competitors far behind.”

Can Yıldızlı was invited to an international conference to be held by the Department of Defense in Atlanta.  All expenses of Yıldızlı will be paid for by the Department of Defense, and he will receive an award at the ceremony to be held during the conference.

Yıldızlı was also invited to a visit to the IMPACT (International Multilateral Partnership Against Cyber Threats) headquarters in Malaysia.  All expenses of this trip will be paid for by the Department of Defense as well.

The article says that Can YILDIZLI or Icarus was gifted in the art of Security, and no doubt works for the FBI.  A user on another forum states:

Icarus was hired by them because of his ‘skill’ he’s a genius when it comes to security. However when it comes to programming he’s quite the opposite.

Now this is all fabricated from the evidence that has been found, none of this is fact but a theory developed by the users of Ic0de.org, we will probably never get the true answer, but as of now OpenSC.ws is down and probably won’t be back in the near future.

Tags: adminfoundnewopensc.wssite
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more

EasyDoc malware infects Macs and routes through TOR

by Kyle
July 6, 2016
0
EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims...

Read more

Hummer malware infecting androids earns $3.5 Million a week

by Paul Anderson
July 6, 2016 - Updated on May 17, 2022
0
Hummer malware infecting androids earns $3.5 Million a week

A new Trojan, named Hummer, has been discovered infecting Android phones. The malware creators are earning an estimated $3,500,000 a week or $500,000 a day say researchers at...

Read more
Next Post
Apple Stores Hacked, Is Apple Vulnerable?

Apple Stores Hacked, Is Apple Vulnerable?

Related News

Google Chrome Extension fingerprinting source

Google Chrome exposes user extensions to fingerprinting

July 1, 2022
Downthem DDoS Service owner sentenced

Downthem DDoS service owner gets a 2-year prison sentence

June 30, 2022
Cloudflare record breaking DDoS

Cloudflare Stops Record-Breaking DDoS

June 29, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
    • Tools
  • Data Breaches
  • Malware
  • Privacy
  • Contact Us

© 2022 ZeroSecurity, All Rights Reserved.