Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Public

The Real Owner of OpenSC.ws?

Paul Anderson by Paul Anderson
June 19, 2012 - Updated on November 2, 2012
in Public, Technology
21
Opensc Real Owners
78
SHARES
1.3k
VIEWS
Share on FacebookShare on Twitter

Opensc Real OwnersOpenSC.ws was recently hacked and the deface page was up for about a day or so,  the site is now down and the webmaster is no where to be found.  Many are wondering what was the motivation behind the individuals targeting OpenSC.ws (a “underground” programming forum).  After the original owners left, including Icarus (the owner of the forum at the time).  Icarus sold the forum to whoever would pay.  A user by the name of “Reine” helped contribute to the payment of OpenSC.ws (the community was told).

You might also like

Amazon bans Flipper Zero

Silent OS 3.0 for Blackphone Completely revamped

Megaupload Plans to Return After 5 Years

Now, none of this confirmed, but looking at the evidence it is believed Reine and Icarus are the same person, but who is the person behind these two accounts?

The end of 2011 OpenSC.ws released an Android and IPhone app to access their website with a GUI that was user friendly and allowed users to access the forums on the move.  The app was released and can now be found here.

If you look at the author of the app that Reine stated that he had coded, you will see a unfamiliar name:

kc3jI

 

Who is this Can YILDIZLI?  Well, if we do a quick Google search you come up with many links such as a LinkedIn account, Facebook and a couple articles of a competition.   One of the articles states:

Teams of 3 or 4 contestants from all over the world took part in the contest.  The challengers were members of leading computer technology companies, cyber war intelligence experts, teams from military and law enforcement, and IT experts of universities.

The objective of the challenge was to track hackers in cyberspace and crack codes to collect intelligence.  Can Yıldızlı joined the challenge alone under the alias “LoneWolf,” and cracked hundreds of codes to uncover the data hidden behind music and image files.  Yıldızlı kept track of professional hackers with the software he developed, and gathered a wealth of digital evidence.

The challenge is considered the largest and the longest competition in digital evidence collecting and intelligence.  The Pentagon aims to discover more talent in the field and encourage more IT experts to work in cyber defense.

The challenge began in January 2011, and contestants were given problems of varying difficulty for almost 1 year.

Speaking on collecting digital evidence, cracking codes and various issues in intelligence, Can Yıldızlı said: “I cracked a code placed in a digital image file to uncover the encrypted message.  I also tracked hackers to collect evidence of their criminal acts and identities.  I was the first among 1147 teams from 52 countries.  My competitors were usually teams of 4, while I competed as a ‘LoneWolf.’  At the end of the challenge, I took first place with 4789 points.  The first and second runners-up were teams of 4 people, and they only took around 3500 points.  Although I competed on my own, I was able to leave my closest competitors far behind.”

Can Yıldızlı was invited to an international conference to be held by the Department of Defense in Atlanta.  All expenses of Yıldızlı will be paid for by the Department of Defense, and he will receive an award at the ceremony to be held during the conference.

Yıldızlı was also invited to a visit to the IMPACT (International Multilateral Partnership Against Cyber Threats) headquarters in Malaysia.  All expenses of this trip will be paid for by the Department of Defense as well.

The article says that Can YILDIZLI or Icarus was gifted in the art of Security, and no doubt works for the FBI.  A user on another forum states:

Icarus was hired by them because of his ‘skill’ he’s a genius when it comes to security. However when it comes to programming he’s quite the opposite.

Now this is all fabricated from the evidence that has been found, none of this is fact but a theory developed by the users of Ic0de.org, we will probably never get the true answer, but as of now OpenSC.ws is down and probably won’t be back in the near future.

Tags: adminfoundnewopensc.wssite
Share31Tweet20
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Amazon bans Flipper Zero

by Paul Anderson
April 11, 2023
0
Flipper zero no longer being sold on Amazon

E-commerce giant Amazon has recently banned the sale of the Flipper Zero portable multi-tool for pen-testers, citing its potential use as a card-skimming device. The move has prompted...

Read more

Silent OS 3.0 for Blackphone Completely revamped

by Paul Anderson
July 24, 2016 - Updated on May 17, 2022
1
Silent OS 3.0 for Blackphone Completely revamped

Version 3.0 migrates Silent OS to Android Marshmallow 6.0.1 and delivers the Android safety patch level to June 2016. Along with fixes for security vulnerabilities, Silent OS 3.0...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Exploit Kit activity on a steep decline since April

by Paul Anderson
July 12, 2016
0
Exploit Kit activity on a steep decline since April

As malware writers are moving to Neutrino and RIG exploit kits (EK) for dispersal needs, security experts are investigating how distribution is innovating, and they are generally signaling a huge...

Read more

EasyDoc malware infects Macs and routes through TOR

by Kyle
July 6, 2016
0
EasyDoc malware infects Macs and routes through TOR

Antivirus company, Bitdefender has released an alert regarding a harmful application that infects Macs and connects to the command-and-control servers via Tor. The program, called EasyDoc Converter.app, claims...

Read more
Next Post
Apple Stores Hacked, Is Apple Vulnerable?

Apple Stores Hacked, Is Apple Vulnerable?

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.