Interview reveals major government security vulnerabilities

DuRab, member of the security site COTSE, has published this interview with hacker Fuqrag. Fuqrag, an associate of the now-infamous flipz, describes some of the techniques they use to exploit servers and gives a glipse into the mind of malicious hacking. The really concerning part of the interview is Fuqrag's extremely casual attitude about being able to gain access to many government servers at will.
DuRab: Aren't you afraid of getting raided? Fuqrag: No, im not for a few reasons. One, I bounce through so many local phone systems before I dial into an account at an ISP which I don't own (laughs). After all of that I chain proxies and wingates and stuff until I'm bouncing all over the goddamned world. I met up with some guys on a private network, from all over the world, and on new years eve, we're gonna pick 100 boxes each and hit them all on that night. There are so many government boxes that are simple to crack, and the defacements we do are only half the story. We've been probing internal networks, I was on one last night, which had an 8-gigabyte database of government employees.

Tip: You can use the A/Z keys to walk threads.
View options

This discussion is now closed.