this post was submitted on 20 Oct 2024
423 points (98.8% liked)

Piracy: ꜱᴀɪʟ ᴛʜᴇ ʜɪɢʜ ꜱᴇᴀꜱ

54758 readers
324 users here now

⚓ Dedicated to the discussion of digital piracy, including ethical problems and legal advancements.

Rules • Full Version

1. Posts must be related to the discussion of digital piracy

2. Don't request invites, trade, sell, or self-promote

3. Don't request or link to specific pirated titles, including DMs

4. Don't submit low-quality posts, be entitled, or harass others



Loot, Pillage, & Plunder

📜 c/Piracy Wiki (Community Edition):


💰 Please help cover server costs.

Ko-Fi Liberapay
Ko-fi Liberapay

founded 1 year ago
MODERATORS
 

The FBI sleeps when libraries burn

top 50 comments
sorted by: hot top controversial new old
[–] jwiggler 234 points 1 month ago (7 children)

Hackers acting as if they're doing a public service by bringing down a free publicly accessible tool is a new level of assbackwardness.

If the goal really was to force IA to increase their security, they would've tried to consult with them. This is more about notoriety and chaos and the hackers have no moral ground to stand on.

[–] [email protected] 100 points 1 month ago

Yeah look at me flexing on and underfunded non profit.

Not at all hackers are criminals, but many are idiots.

[–] Varyk 59 points 1 month ago (2 children)

was that their stated reason for attacking the internet archive?

to bring awareness to the security breaches?

little fucks.

"I stole your wallet because pockets are so vulnerable. I'm helping."

[–] [email protected] 50 points 1 month ago (1 children)

nobody know true reason

one group claim responsibility on twitter for ddos, reason they are us company and us support genocide in gaza. but from all us company they chose ia? sound like bullshit.

[–] [email protected] 9 points 1 month ago

You know what would be good place to archive and show the coming generations how corpos were deaf to the GAZA's plight? Internet Fucking Archive

I just get the feel that they either are lazy for mentioning gaza or malicious to muddy the reputation of the protesters.

[–] [email protected] 17 points 1 month ago (1 children)

No, it was somehow because they hate NATO

[–] Varyk 18 points 1 month ago (1 children)

oh good, that totally makes senseWHAT?!

[–] [email protected] 3 points 1 month ago* (last edited 1 month ago)

You see, some NATO members have been known to use the internet. Artifacts of that usage may have been archived, like their statements and voting choices. For example, if IA stored a page where Jens Stoltenberg called a polandball comic "funny and accurate" in 2019. That would be bad for Gaza.

[–] [email protected] 20 points 1 month ago (1 children)

Hackers acting as if they're doing a public service by bringing down a free publicly accessible tool is a new level of assbackwardness.

are the zendesk hackers the same as the ones who brought down the website initially?

load more comments (1 replies)
[–] openrain502r 10 points 1 month ago* (last edited 1 month ago) (1 children)

iirc some group on twitter claiming that they were the ones behind the attack mentioned it had to do with Palestine or something like that? bruh the internet archive is a non profit organisation.

then when people pointed it out, they mentioned that since they were incorporated in the USA they were still guilty or something like that? dude wtf

[–] [email protected] 9 points 1 month ago

Black hat v grey hat innit

[–] [email protected] 8 points 1 month ago* (last edited 1 month ago)

Their emotional maturity is close to zero.

They go after internet archive, such a lame move.

[–] [email protected] 5 points 1 month ago (1 children)

those hackers are probably paid by the corporations wanting to bring it down

[–] [email protected] 6 points 1 month ago

As much as I probably ideologically stand with you, let's not confirmation bias ourselves into a belief we have no evidence for.

[–] [email protected] 163 points 1 month ago (4 children)

This person could be damaging corporate infrastructure but he goes after internet archive

[–] [email protected] 42 points 1 month ago (4 children)

This guy is outing the archive for terrible security posture by bringing attention to it because they received disclosures and did not fix them.

Don't get shit twisted - he's the hero here. IA fucked up and has been vulnerable to manipulation by any number of corporate or national actors this entire time.

[–] [email protected] 55 points 1 month ago

If this was genuinely done out of love I could understand but due to the legal battles the internet archive is currently being dragged through, I harbor suspicion of their intent.

[–] [email protected] 43 points 1 month ago (1 children)

If they were really "the hero", they'd follow the bare minimum of responsible disclosure best practices, and allow 90 days between privately alerting them of the issue and going public with it. Two weeks is absurd.

[–] [email protected] 4 points 1 month ago (1 children)

90 days to cycle private tokens/keys?

[–] [email protected] 7 points 1 month ago (1 children)

90 days is just the standard timeframe for responsible disclosure. And normally that's just a baseline with additional time being given if there's genuine communication going on and signs they're addressing the problem.

[–] [email protected] 5 points 1 month ago (1 children)

90 days is standard for "you're code is fucked when someone presses this..."; if the issue is Dave left the keys in the parking lot and someone copied them, two weeks is more than enough time for them to recieve the notice, create a ticket to rotate the keys and a ticket to trigger an investigation (gotta document anytime an org fucks up so it doesn't happen again, right?). Maybe I'm over simplifying it though, I don't know how their org operates.

load more comments (1 replies)
[–] carpelbridgesyndrome 35 points 1 month ago (1 children)

You don't leak a passwords database publicly on the Internet in good faith.

[–] [email protected] 18 points 1 month ago (7 children)

Not necessarily the same hacker.

load more comments (7 replies)
[–] [email protected] 14 points 1 month ago (1 children)

You sure about that, or are you hypothesizing?

[–] [email protected] 11 points 1 month ago

There's never certainty when talking about hackers...

That's verbatim the content of the email and the email hack does not appear to be malicious (unlike the ddos or the password breach)

It's more likely that this is 3 different groups than it is a single group.

[–] [email protected] 10 points 1 month ago

The hackers are mostly not okay. Fucking bootlickers.

[–] 0x4E4F 1 points 1 month ago

Because none of this was random or premeditated as in to strengthen their security.

[–] [email protected] 55 points 1 month ago (3 children)

This strikes me as state-funded or state adjacent hacking. Kind of like how the destruction of Twitter eliminated a source of on-the-ground, 24/7 information for the working class on all of the events our governments would prefer we not see so that their propaganda can be produced more lazily. Destroying the Internet Archive acts as another hindrance to the working class when it comes to staying informed and enriched.

[–] [email protected] 28 points 1 month ago (1 children)

This message here in particular is not looking state funded if you ask me. Gaining access to zendesk tickets is a vulnerability which was published a few weeks/months ago and is not difficult at all.

load more comments (1 replies)
[–] winterayars 19 points 1 month ago (1 children)

I don't know about state funded, but corporations really, really hate IA for a lot of reasons.

[–] 0x4E4F 3 points 1 month ago* (last edited 1 month ago)

Like keeping old versions of their software for one... or source code leaked or deleted for one reason or another... and other info of course.

I use it regularly to link to source files or packages long deleted, but I still use them for one thing or another.

[–] [email protected] 11 points 1 month ago (1 children)

I'm sorry, there is a .yachts TLD?

load more comments (1 replies)
[–] [email protected] 39 points 1 month ago (3 children)

Why they don't try to ddos and hack ChatGPT instead or something?

[–] [email protected] 19 points 1 month ago

Because they're corporate bootlickers, paid or otherwise.

Look at the people that participate in "Hacker News." corporate-art bootlicker

[–] zarkanian 5 points 1 month ago (1 children)

Hey, instead of picking on that little kid, why don't you go harass that huge bodybuilder guy with all the knives attached to his belt?

[–] [email protected] 2 points 1 month ago

well, yeah. its still better than picking on a kid.

[–] 0x4E4F 1 points 1 month ago

Because no one has offered any money regarding that.

[–] [email protected] 28 points 1 month ago

FFS, that whole hack has left the IA a shambles.

[–] [email protected] 28 points 1 month ago

The FBI sleeps when libraries burn

This dumbass is probably being paid by them in the first place lol

[–] [email protected] 19 points 1 month ago

Ok, but no need to be bitchy towards the good librarians.

[–] [email protected] 1 points 1 month ago (1 children)

Doesn't seem to be ill intended, not a good way to point out a problem, but the problem is there.

[–] 0x4E4F 3 points 1 month ago* (last edited 1 month ago) (1 children)

There are other ways to point out a problem. What this person did could have been done as a POC, discussed privately with IA and published publicly later on, when the problem was patched.

This was deliberate and probably paid for.

[–] Ajen 1 points 1 month ago (1 children)

Deliberate? If someone was paying for it, wouldn't they have done something more harmful?

[–] 0x4E4F 1 points 1 month ago (1 children)

Maybe that was the only thing that was easily exploitable... or maybe it's a warning... or maybe not enough pay for something more sinister... or maybe all of the above.

[–] Ajen 1 points 1 month ago (1 children)

None of those theories sound very plausible. It's far more likely that an amateur who didn't understand responsible disclosure decided to check if the keys that were leaked 2 weeks ago are still valid, got excited when they were, and chose a slightly-irresponsible way to share their findings.

They didn't exploit or hack anything. They just tried to log in with credentials that were leaked 2 weeks ago.

[–] 0x4E4F 1 points 1 month ago* (last edited 1 month ago) (1 children)

It's still an exploit if he/she didn't rightfully have access to those parts of IA.

And what was written in that screenshot doesn't say "script kiddie" to me, it says that this person knew full well what he/she was doing. Script kiddies lack confidence. That is not what I'm getting from the screenshot.

It may also be a plan that was in the making for a long time, but the party was just waiting for an easy opportunity to make a good hit on IA.

Most people into security knew they were leaked a few weeks ago and everyone (including myself) thought that, yes, they are probably still working, but they're understaffed, so they'll probably get to it, but it'll take a few more weeks. It never occured to me that anyone in their right mind would deliberately do harm to IA. There's honor, even amongst thieves. I know for certain at least one group looked at those keys and didn't do anything. Why bite the very thing that you rely on... there is no point. All of us use IA for various things, including long gone packages and source code. It would be dumb to actually do this. Unless there is a financial incentive, of course... I'm sorry, but that's the only thing that makes sense in my mind.

[–] Ajen 1 points 1 month ago (1 children)

Being "into" security doesn't make you an expert. Why wouldn't you expect rotating the leaked keys to be one of the first steps of their incident response plan?

And script kiddies lack confidence? I don't know why you'd think that - from what I've seen they tend to be over-confident and act like they know more than they actually do.

load more comments (1 replies)
load more comments
view more: next ›