The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
You are here: Home / Viruses & Malware / Anonymous Denies Authoring Linux OS
DDoS Protection Powered By Verisign
Anonymous Denies Authoring Linux OS
Anonymous Denies Authoring Linux OS
By Barry Levine / Enterprise Security Today Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MARCH
15
2012

There's a new open-source Linux-based operating system that is branded with the name of the most famous "hacktivist" group, Anonymous. But members of that group are saying that they did not create it, and that the OS is packaged with Trojans.

The 1.5 GB, Ubuntu-derived OS is called Anonymous OS Live, and it's available via Source Forge in a 32-bit version that is supposed to include various hacker tools, including such Denial of Service apps as Slowloris and HOIC. Source Forge is often used as a repository for software code. The download also contains the security app Wireshark, a BitTorrent client, and the Firefox Web browser.

'Educational Purposes'

The alleged authors of the OS included a statement that it was "created for educational purposes," for checking the security of Web pages.

The purported makers also warn users that "if you attack to any Web page, might end up in jail because is a crime in most countries!" Such a warning against attacking a Web site is not characteristic of Anonymous communications, especially since it contains awkward syntax and a smiley-face emoticon.

A key difficulty in assessing the actions of an anonymous group of independent programmers, of course, is knowing who is actually Anonymous and who is not. One source of information, which is considered by many to be reliably from the organization, is the @Anonops account on Twitter, from which have emanated numerous, apparently authentic Anonymous communications in the past.

Tweets from that account have warned against downloading the OS, calling it "fake" and contending that it is "wrapped" in Trojan malware.

Some observers have suggested the OS was generated by a lone individual who used the Ubuntu Live CD Creator app.

Plot for a Cyber-Thriller?

In another sign that the OS creators might be deceptive, they have also included statements on their "anonymous-os" Tumblr micro-blog page that "in our world, in Linux and open source world, there is not virus," which is inaccurate -- not to mention that the language is not typical of the polished communiqués from the PR-conscious Anonymous.

Graham Cluley, senior technology consultant at security firm Sophos, wrote on his company's blog on Thursday that more than 20,000 users may have already downloaded the OS. He wondered "why would anyone want to put their trust in a piece of unknown software, written by unknown people, promoted on an Anonymous Tumblr Web page that you don't know is safe or not?"

In fact, he suggested, such an OS download could be the centerpiece of a cyber-thriller, where, in order to obtain information on the hacktivist network, an OS purporting to be from the mysterious network was made available -- but, in reality, it reported back information on its users. Cluley recalled that, earlier in 2012, a Slowloris Denial of Service tool had been made available to hackers on Anonymous -- and it was infected with Trojans.

While Anonymous may not officially claim this OS, the group has been accused of using its own brand of trickery as one of its tactics. For instance, earlier this year security experts reported that the group was tricking users into becoming part of a Denial of Service attack against U.S. government and entertainment industry Web sites, via Javascript embedded into special Web pages built to redirect visitors to targeted Web sites.

That attack was conducted by the group as retailiation for a government raid on the New Zealand-based Megaupload site for violating intellectual property piracy laws.

Read more on: Anonymous, Hackers, Linux, Trojans
Tell Us What You Think
Comment:

Name:

Aaron:

Posted: 2012-03-18 @ 1:39pm PT
I have a feeling that os does not even hold a candle compared to backtrack.

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN VIRUSES & MALWARE
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.
 

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.