The FBI sleeps when libraries burn

  • jwiggler@sh.itjust.works
    link
    fedilink
    English
    arrow-up
    233
    ·
    1 month ago

    Hackers acting as if they’re doing a public service by bringing down a free publicly accessible tool is a new level of assbackwardness.

    If the goal really was to force IA to increase their security, they would’ve tried to consult with them. This is more about notoriety and chaos and the hackers have no moral ground to stand on.

    • zante@lemmy.wtf
      link
      fedilink
      English
      arrow-up
      95
      ·
      1 month ago

      Yeah look at me flexing on and underfunded non profit.

      Not at all hackers are criminals, but many are idiots.

    • Varyk@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      60
      ·
      1 month ago

      was that their stated reason for attacking the internet archive?

      to bring awareness to the security breaches?

      little fucks.

      “I stole your wallet because pockets are so vulnerable. I’m helping.”

      • far_university190@feddit.org
        link
        fedilink
        English
        arrow-up
        49
        ·
        1 month ago

        nobody know true reason

        one group claim responsibility on twitter for ddos, reason they are us company and us support genocide in gaza. but from all us company they chose ia? sound like bullshit.

        • just_an_average_joe@lemmy.dbzer0.com
          link
          fedilink
          English
          arrow-up
          8
          ·
          1 month ago

          You know what would be good place to archive and show the coming generations how corpos were deaf to the GAZA’s plight? Internet Fucking Archive

          I just get the feel that they either are lazy for mentioning gaza or malicious to muddy the reputation of the protesters.

    • switchboard_pete@fedia.io
      link
      fedilink
      arrow-up
      19
      ·
      1 month ago

      Hackers acting as if they’re doing a public service by bringing down a free publicly accessible tool is a new level of assbackwardness.

      are the zendesk hackers the same as the ones who brought down the website initially?

      • Ajen@sh.itjust.works
        link
        fedilink
        English
        arrow-up
        1
        ·
        30 days ago

        No. And it’s hard to call the zendesk one a hack, even. They just used the same credentials that were leaked a couple weeks before.

    • openrain502r@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      10
      ·
      edit-2
      1 month ago

      iirc some group on twitter claiming that they were the ones behind the attack mentioned it had to do with Palestine or something like that? bruh the internet archive is a non profit organisation.

      then when people pointed it out, they mentioned that since they were incorporated in the USA they were still guilty or something like that? dude wtf

    • umbrella@lemmy.ml
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 month ago

      those hackers are probably paid by the corporations wanting to bring it down

    • huginn@feddit.it
      link
      fedilink
      English
      arrow-up
      66
      ·
      1 month ago

      This guy is outing the archive for terrible security posture by bringing attention to it because they received disclosures and did not fix them.

      Don’t get shit twisted - he’s the hero here. IA fucked up and has been vulnerable to manipulation by any number of corporate or national actors this entire time.

      • ComradeSharkfucker@lemmy.ml
        link
        fedilink
        English
        arrow-up
        56
        ·
        1 month ago

        If this was genuinely done out of love I could understand but due to the legal battles the internet archive is currently being dragged through, I harbor suspicion of their intent.

      • Zagorath@aussie.zone
        link
        fedilink
        English
        arrow-up
        48
        ·
        1 month ago

        If they were really “the hero”, they’d follow the bare minimum of responsible disclosure best practices, and allow 90 days between privately alerting them of the issue and going public with it. Two weeks is absurd.

        • Ashelyn
          link
          fedilink
          English
          arrow-up
          4
          ·
          1 month ago

          90 days to cycle private tokens/keys?

          • Zagorath@aussie.zone
            link
            fedilink
            English
            arrow-up
            8
            ·
            1 month ago

            90 days is just the standard timeframe for responsible disclosure. And normally that’s just a baseline with additional time being given if there’s genuine communication going on and signs they’re addressing the problem.

            • ITGuyLevi@programming.dev
              link
              fedilink
              English
              arrow-up
              5
              ·
              1 month ago

              90 days is standard for “you’re code is fucked when someone presses this…”; if the issue is Dave left the keys in the parking lot and someone copied them, two weeks is more than enough time for them to recieve the notice, create a ticket to rotate the keys and a ticket to trigger an investigation (gotta document anytime an org fucks up so it doesn’t happen again, right?). Maybe I’m over simplifying it though, I don’t know how their org operates.

              • Zagorath@aussie.zone
                link
                fedilink
                English
                arrow-up
                1
                ·
                1 month ago

                I agree in general, but

                Maybe I’m over simplifying it though, I don’t know how their org operates.

                This is exactly why just sticking to the 90 day standard is better. For the supposed security researcher it’s a CYA move at worst.

          • LukácsFan1917@lemmy.ml
            link
            fedilink
            English
            arrow-up
            1
            ·
            1 month ago

            It’s not uncommon for hackers to sell cures for problems they cause. This includes law enforcement, which can have broader goals like promoting their own cybersecurity outfits, even just promoting deoendency on HIBP if it’s a fed thing would be useful here, making the joke they left on the page telling people to check out the site itself suspect. The internet archive is a large and beloved outlet for piracy and depaywalling, maybe the security enhancements being billed to them could help the industry bring them to heel a bit. Just speculating.

            • Ajen@sh.itjust.works
              link
              fedilink
              English
              arrow-up
              1
              ·
              30 days ago

              Are you saying the person who sent the zendesk email is going to try to get IA to hire them for something? I’m not sure I follow…

              • LukácsFan1917@lemmy.ml
                link
                fedilink
                English
                arrow-up
                1
                ·
                30 days ago

                No I think it’s about “context creation” as they call it. Like a protetection racket where payment is made in dependence on certain tools, that is intended to be used later. Good way to popularize leaks themselves

                • Ajen@sh.itjust.works
                  link
                  fedilink
                  English
                  arrow-up
                  1
                  ·
                  29 days ago

                  Still not sure what you’re talking about… Is someone going to ask IA for payment related to the zendesk email?

    • apotheotic (she/her)@beehaw.org
      link
      fedilink
      English
      arrow-up
      52
      ·
      1 month ago

      I mean this person seems to be not doing it maliciously. As they say, if it wasn’t them, it would be someone else. Pushing archive to improve their security is great for everyone. As long as this person doesn’t do anything actually malicious, they’re in the clear as far as I’m concerned.

    • LukácsFan1917@lemmy.ml
      link
      fedilink
      English
      arrow-up
      2
      ·
      1 month ago

      I have to say that the way they are advertising “HAVE I BEEN PWNED” makes this look like law enforcement selling cures to problems they create. The owner has that CIA front company type CV. It makes my head shudder uncontrollably. 🐙🌕🤕

  • orca@orcas.enjoying.yachts
    link
    fedilink
    English
    arrow-up
    51
    ·
    1 month ago

    This strikes me as state-funded or state adjacent hacking. Kind of like how the destruction of Twitter eliminated a source of on-the-ground, 24/7 information for the working class on all of the events our governments would prefer we not see so that their propaganda can be produced more lazily. Destroying the Internet Archive acts as another hindrance to the working class when it comes to staying informed and enriched.

    • B0rax@feddit.org
      link
      fedilink
      English
      arrow-up
      28
      ·
      1 month ago

      This message here in particular is not looking state funded if you ask me. Gaining access to zendesk tickets is a vulnerability which was published a few weeks/months ago and is not difficult at all.

    • zarkanian@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      7
      ·
      1 month ago

      Hey, instead of picking on that little kid, why don’t you go harass that huge bodybuilder guy with all the knives attached to his belt?