Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Technology

Hacking of th3j35t3r’s Accounts Blown out of Proportion

Paul Anderson by Paul Anderson
July 11, 2012 - Updated on July 12, 2012
in Technology
0
Screen shot 2012 07 09 at 2.45.49 AM The Jester Is Hacked
75
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

It has been a interesting 36 hours. Firstly, for my supporters, sorry for the delay, sometimes, as we have seen before with me, I choose to wait and watch the field before I react to the more bizzaro events.

You might also like

Amazon bans Flipper Zero

Megaupload Plans to Return After 5 Years

Clinton pledges to grow the technology sector

For those who don’t already know, apparently *I* have been ‘hacked’ including *my* social networking and bank accounts. These claims are incorrect. I will, however admit that a rather nice ‘sideways hack’ was deployed jesteragainst my twitter.

Aside from that no breaches or relevant information, ‘personal’ or otherwise has come out of this episode and my position remains uncompromised.

All is well in JesterLand and here’s why……

The email account hacked was abandoned and sanitized 2 years ago and is one of many that are out there. They exist for a reason. Historical is credible. None contain anything of value.

The accounts subsequently ‘hacked’ through information found within are not *my* accounts – they are accounts, information and disinformation of the persona, not the person. They are rigged to have service messages from decoy accounts and services delivered to them long after abandonment.[pullquote]‘The quieter you are the more you can hear.’ [/pullquote]

Does anyone actually think I would be stupid enough to leave or allow a single shred of relevant real-world information, even in ‘conversation’ that pertained to the actual me?

When a person decides to go down the road I travel, I can tell you a lot of time is spent before and during ops (sometimes more than anything else) in the laying down of info and disinfo over a long period of time as we have seen, that email account like many still out there has been sitting there, just waiting to be violated.

It took 2 years for it to happen with this one and any information in the 2700 emails that it has received in that period is of no consequence. But I hope much time is spent laboring on over-analyzing every detail, chasing down every rabbit-hole.

Teaser: there are at least 14 more of this type of account sitting around. Some spell ‘jester’ differently than others. So there’s plenty more rabbit holes to explore.

Something I spent yesterday doing was to access each and every abandoned account still out there and look at the persistent cookies these services send to the users browser. Project Looking Glass is now updated to enumerate these cookies, telling me if a target has been involved in this latest attempt.

Sometimes folks make things really much easier, here’s just a few of the failed doxing attempts we have seen, some more than others. (thanks to ‘_St0rm‘ who posted this pastebin a while back http://pastebin.com/vykQ70Ba)

To date I have been incorrectly identified as:

John Willander, Ryan Berg, Robin Jackson, Robin Sage, Anthony Freed, Beau Colvin, Tom Ryan, Jake ??????, Tom Ledoux, Ed Williams, Joseph Black, Mark Walker, Zack Knight, Andrew Bay, Don Eijndhoven, Stephen Stone, Hugh De Luc, Paul Smecker, Matthew Mullenweg, Casey Gardiner, Christopher Barnes, Eric Kabisch …..

I am sure there’s more out there too.

That’s no less than 22 fails. I have many times, stepped in to defend the real non-decoy people within this list that my enemies have decided are me, and I really hope these poor folks either never hear of who they have been accused of being or shake it off in their stride.

Now about the twitter ‘takeover’.

I have to say that was clever. Even though my account wasn’t actually breached per se. The folks behind this latest attempt found an auto-RSS/Email to tweet script that uses the Twitter API and worked out a way to post to my account without actually having any physical access. Kudos.

Okay folks, I have to go floss. Its been almost as interesting as last time we had a bizzaro event. To those that support me and even to those that don’t my closing message is the same:

Stay Frosty.

Peace.

Screen shot 2012 07 09 at 2.45.49 AM The Jester Is Hacked

There’s an equal amount of good and bad in most things. The trick is to figure out the ratio and act accordingly.

Lots of love from….

John Willander (and)……..

Ryan Berg (and)……..

Robin Jackson (and)……..

Robin Sage (and)……..

Anthony Freed (and)……..

Beau Colvin (and)……..

Tom Ryan (and)……..

Jake ?????? (and)……..

Tom Ledoux (and)……..

Ed Williams (and)……..

Joseph Black (and)……..

Mark Walker (and)……..

Zack Knight (and)……..

Andrew Bay (and)……..

Don Eijndhoven (and)……..

Stephen Stone (and)……..

Hugh De Luc (and)……..

Paul Smecker (and)……..

Matthew Mullenweg (and)……..

Casey Gardiner (and)……..

Christopher Barnes (and)……..

Eric Kabisch.

Did I miss anyone? Oh yes… Elvis (Presley).

……..Is this getting boring yet?

source: http://www.infosecisland.com/blogview/21887-Rumors-of-Anonymous-Hacking-th3j35t3rs-Accounts-Overblown.html

Tags: anonymousdisinformationhackedjester
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Amazon bans Flipper Zero

by Paul Anderson
April 11, 2023
0
Flipper zero no longer being sold on Amazon

E-commerce giant Amazon has recently banned the sale of the Flipper Zero portable multi-tool for pen-testers, citing its potential use as a card-skimming device. The move has prompted...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Clinton pledges to grow the technology sector

by Paul Anderson
July 2, 2016
0
Clinton pledges to grow the technology sector

Speaking in Denver on Tuesday at a startup incubator called Galvanize, Democratic presidential hopeful Hillary Clinton made quite a few proposals concerning intellectual property and called for administrative...

Read more

Twitch.tv punishes view bot maker with a lawsuit

by Paul Anderson
June 21, 2016
0
Twitch.tv punishes view bot maker with a lawsuit

Twitch has had it with bots that unnaturally increase view counts for videos. The game-streaming company is now handing out lawsuits to programmers of these bots. In a post...

Read more

DMCA requests quadruple in two years says Google

by Kyle
June 20, 2016
0
DMCA requests quadruple in two years says Google

Google has been bombarded with DMCA takedown requests. The corporation has seen the volume of takedown notices from rights holders quadruple over the last two years. In 2016...

Read more
Next Post
450k Credentials leaked from Yahoo

450k Credentials leaked from Yahoo

Related News

BreachForums Owner Arrested and Charged

BreachForums Owner Arrested and Charged

March 17, 2023
ChipMixer platform tied to crypto laundering scheme – seized by authorities

ChipMixer platform tied to crypto laundering scheme – seized by authorities

March 17, 2023
NSA intercepting U.S. Routers

NSA intercepting U.S. Routers

June 6, 2014 - Updated on March 17, 2023
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.