{"id":6010,"date":"2012-02-10T18:33:33","date_gmt":"2012-02-11T01:33:33","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=6010"},"modified":"2018-01-30T13:16:00","modified_gmt":"2018-01-30T20:16:00","slug":"the-united-nations-hacked-team-poison-claims-responsibility","status":"publish","type":"post","link":"https://www.webroot.com/blog/2012\/02\/10\/the-united-nations-hacked-team-poison-claims-responsibility\/","title":{"rendered":"The United Nations hacked, Team Poison claims responsibility"},"content":{"rendered":"<p>A well known group of hackers has penetrated the networks of the United Nations, according to a note posted on Pastebin.com.<\/p>\n<p style=\"text-align:center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/united_nations.jpg\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter  wp-image-6011\" title=\"United_Nations\" src=\"http:\/\/webrootblog.files.wordpress.com\/2012\/02\/united_nations.jpg\" alt=\"\" width=\"480\" height=\"320\" \/><\/a><\/p>\n<p>The group claiming responsibility is <strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Team_Poison\">Team Poison<\/a><\/strong>, a hacking group closely associated with the Anonymous hactivist movement. Team Poison members include\u00a0TriCk, iN^SaNe, MLT,Phantom~, C0RPS3, f0rsaken, aXioM and ap0calypse.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p>The <strong><a href=\"http:\/\/pastebin.com\/ZB4eLVeS\">note posted on Pastebin.com<\/a><\/strong> includes details from the databases of the United Nations, as well as a list of potentially exploitable vulnerabilities located within the <strong>un.org<\/strong> domain. The reason for hacking?<\/p>\n<p>According the note:<\/p>\n<blockquote><p>I f*ck actually system&#8230; I fighting for Internet Freedom, equiality &amp; rights for all. You&#8217;re FREEDOM my brothers &amp; my sisters ! &lt;3<\/p><\/blockquote>\n<p>This isn&#8217;t the first time that Team Poison has targeted the United Nations.<\/p>\n<p><strong><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2397032,00.asp\">Back in November 2011<\/a><\/strong>, the group once again compromised networks belonging to the United Nations, and leaked usernames and passwords. Team Poison is also known to have participated in the Anonymous-backed operation\u00a0Operation Robin Hood &#8211;\u00a0&#8220;<em>Operation Robin Hood will take credit cards and donate to the 99% as well as various charities around the globe. The banks will be forced to reimburse the people their money back.<\/em>&#8221;<\/p>\n<p>The UN has been notified of the incident and is currently investigating.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<strong><a href=\"http:\/\/nl.linkedin.com\/in\/danchodanchev\">LinkedIn Profile<\/a><\/strong>. You can also\u00a0<strong><a href=\"http:\/\/www.twitter.com\/danchodanchev\">follow him on \u00a0Twitter<\/a><\/strong>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A well known group of hackers has penetrated the networks of the United Nations, according to a note posted on Pastebin.com. The group claiming responsibility is Team Poison, a hacking group closely associated with the Anonymous hactivist movement. Team Poison members include\u00a0TriCk, iN^SaNe, MLT,Phantom~, C0RPS3, f0rsaken, aXioM and ap0calypse. More details:<\/p>\n","protected":false},"author":65,"featured_media":17052,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[5037,6281,4047,9641,4317,9645,9633,9623,9647,9635,9629,9643,7915,9631,9637,6275,9627,9639,9625,3471],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6010"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=6010"}],"version-history":[{"count":1,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6010\/revisions"}],"predecessor-version":[{"id":23908,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/6010\/revisions\/23908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17052"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=6010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=6010"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=6010"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=6010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}