Submission   6,795

ADVERTISEMENT

About

NullCrew is a hacktivist group best known for working against large international corporations, educational institutions and government agencies that it deems corrupt. Lead by a person using the pseudonym Null, the group consists of the hackers known as 0rbit, Doc, 3cho, Siph0n, Nop and crazyboris.

Online History

NullCrew's first attack took place on July 12th, 2012, when they hacked into the World Health Organization's website[15], leaking 568 user credentials from their servers in protest of poor global healthcare systems. The following day, they also released passwords from PBS.[13] On the 16th, NullCrew broke in to the technology equipment company ASUS's online store[14], leaking the usernames and passwords of people who had shopped with them. In the following days, NullCrew also hacked into a South African ISP directory[16], Yale University[17] and NetCom[18], leaking user information from each site. On August 5th, the group launched their official Twitter account[1], making their first tweet later that month to announce a hack on Memorex Electronics.


In late August 2012, the group aligned itself with #OpFreeAssange, an Anonymous-lead campaign in support of Wikileaks founder Julian Assange, and targeted Cambridge University, releasing dozens of login information of professors and administrators.[12] Weeks later, NullCrew took on the several websites belonging to the Cambodian government[10] following the arrest of The Pirate Bay's co-founder in that country. The following month, NullCrew claimed that they had control of eight of Sony's servers[11], releasing more than 400 names and e-mail addresses.

On March 6th, 2013, the group hacked in to Time Warner Cable's customer service website, defacing it with the former Gorilla Munch cereal mascot associated with the meme That Really Rustled My Jimmies.[2] They announced on Twitter that the hack was in protest of their use of the Copyrights Alert System[19] launched the previous month to punish subscribers who acquire illegal content. Though the defacement only lasted several hours, the hack exposed the fact that one of Time Warner's administrator passwords was set to the default "change me."

Search Interest

External References



Share Pin

Recent Images 1 total


Recent Videos 0 total

There are no recent videos.




Load 5 Comments
See more