Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
The leader of infamous hacking group responsible for a string of attacks against targets including the British and Australian governments was arrested after unleashing a stream of phone calls that tied up Scotland Yard‘s anti-terrorism hotline.
The teenage hackers from Team Poison (TeaMp0isoN) had crafted a script to bombard the MI6 foreign intelligence hotline with some 700 SIP phone calls from a hacked server in Malaysia over 24 hours, Softpedia reported.
It served as a denial of service attack, jamming the lines so that legitimate calls could not be received. Operators heard a robotic voice saying ‘team poison’ each time calls were answered.
The hackers then intercepted an alleged phone call between the FBI and M16 concerning the attacks and mocked the operators before uploading the recorded conversation to YouTube.
A 17 year old male was arrested last week and charged with conspiracy to cause a public nuisance under Britain’s Computer Misuse Act. His 16 year old accomplice was released on bail.
Scotland Yard said it was “confident” the agency’s communication systems were not been breached and that recordings were made through the “receiving handset only.
Team Poison was an affiliate of the Anonymous collective and a rival of the former LulzSec hacking group. In July last year, the group release accurate information on the identity ofLulzSec members some of whom were arrested this year.
The group also last year had threatened to release BlackBerry staff details after the phone company assisted authorities in the August London riots.
It also published an address book supposedly owned by former British Prime Minister Tony Blair.
Australian Government agencies were also targeted by the group after it reportedly breached an email server and exposed government email addresses and passwords.
Copyright © SC Magazine, Australia
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.