AOL Instant Messenger is hacked

Three 17-year-olds take credit for inserting pornographic images into America Online’s widely used chat service.

Users of the latest version of AOL’s Instant Messenger (AIM) software started encountering an unpleasant surprise on Saturday morning: At least three crackers — malicious hackers — began inserting pornographic images into “AIM Today” and vandalizing content on at least four screens of the chat software.
Since last August, users who launched the latest versions of AIM also launched an informational “AIM Today” window — but as late as 4 pm PST Saturday, if users clicked on the “entertainment” link on AIM Today, followed by a click on any of the following three links advertising the chance to “Meet New People” who wanted to discuss the categories of “Celebrities,” “Soap Operas” or “Comedy,” they would pull up pages displaying pornography, as well as sound files apparently containing messages from the two crackers (“Yeah, fuck you, Sirk owns this shit” — “This is Neon, fuck you Sirk”).
No matter which of the top three “Meet New People” categories are chosen, the content appears to have gone haywire. At the Celebrities link, a series of four pornographic images cycles in an animated GIF. On the Soap Operas link, a Prodigy song plays in the background as a MIDI file. On the Comedy link, below a fifth pornographic image, are pointers to the Aryan group National Alliance.
The chatter and X-rated images appeared next to ads for TV shows broadcast on the AOL-owned Warner Brothers network, including “Charmed” and “Felicity.” AOL officials did not return phone calls over the weekend, but the incident occurred at the same time as the AIM home page was boasting: “Potential AIM Security Issue Resolved.”
An online chat interview with one of the crackers, who identified himself as Sirk, gave some clues as to the methodology. When new members join the AIM service, they can apparently include HTML code in their screen names. That code can include tags that call off-site images and sound files or display text — material that appears where the screen name should appear listed under “Meet New People.”
Sirk — whose name appears throughout the cracked pages — identified himself as one of three 17-year-olds from Connecticut who had been studying AIM for security holes. “I’m surprised somebody hadn’t thought of doing it sooner,” he messaged, “knowing that the AIM Today ‘meet new people’ section is all done through [HTML] links.” He says he hopes to write computer programs that will automatically generate the code to insert images and text into AIM Today — or even re-route AIM Today visitors to a Web page fishing for their password and screen name.
This is not the first time AIM has experienced security holes. Two years ago users discovered that their AIM accounts could be hijacked if the corresponding AOL screen name was not already taken. Sirk taunted AOL for their apparent security holes and their restrictive Terms of Services, but his motives appeared simple: “I’m doing it because I can, and I will.” But he did offer a bombastic message for AOL.
“I’m only hoping that they are upset, and realize that they can’t just program everything like 7th graders.”
He also had a message for AIM users worried about security: “Before using AIM, they should do a little research and find out that this is all part of the territory,” said Sirk. “If you are using a program that’s got as many loopholes and gaps as Swiss cheese, then prepare for the consequences.”

Who is Smokey?

All my life I have loved computers, even as a kid when the only ones out were those apple’s (the ones wolfenstein worked with). I remember just pucnhing keys on the keyboard as if it were connected & as if I were this elite computer wizard. So in the 90’s when AOL first came out my father bought the family our first computer. I remember some how getting into a hacker like private room (island55) and thats where I met Ryder & Glaze. Of course at first I was treated like a nub (we all put in our time!) but I started getting more intrigued by what they were doing & me & Vin (Glaze) began talking much more.

I started to get independent making my own lame programs, viruses (mostly deltree’s & ras pws’s). And then vin did a hack on AOL KW im not sure which one, but sure enough there my handle was “shouts to smokey” and a few others it read. I grew hungrey for the power, the online power to be god! The RAINMAN exploit had just come about & glaze showed me the ropes. For the first day I remeber just testing the commands & not knowing how to actually DO anything, but he showed me. I built a name for myself, and bumped into many friends on this long road Magus was a good friend of mine as well, and I always recived beta’s of Fate ( ❤ Adrian). In about 1997-98 I met Dave & Jim (Oracle & Kai) we formed a little clique and sure enough it wasnt long before we found are first exploit…

The first AIM jack, which kai put in a private release of pH which me & jim & ray (laq) & bigbro were the only ones to have. This is when my name grew bigger, I was the KING of cc scam’s and always had a fresh inbox of about 400 weekly (NO BS, i put that on my kid) spamming was very easy then, but me & adi’s scam page owned all (spamsock WAS VERY good to me). The exploit lasted for almost 6months until hydro released a public verison of the exploit (althought the program invoked the needed window, ours just looped until the aol software error’d and displayed 2 windows) the exploit later died. Dolan another good friend of mine & kai’s had found an exploit 2 weeks after which we releaed on AOL-Files.com THE FREE SN EXPLOIT! This is how I began my ‘career’ if you will as a “AOL” hacker, and I have been around for many exploits & have hacked many AOL servers/sites.

In 06-07 I decided lets bring the OGs of the scene back & cause some shit to show these new kids what the scene really WAS and how botting chats & socialing sn’s isnt what the scene WAS about, it was then about SKILL. So me & a few others (Sirk, DB, Darkknight, Madcow, Dave, Adrian, Dale and some others) gave birth to AOLGang, within 1 month AOLGang was in wired.com, securityfocus & then the feds got wind of us. What had happend was while I was filming an interview for adrians new movie due out soon (Can You Hack IT?) they asked me about a recent hacker called “virus” I told them I have heard of him, but I didnt know him. They went into detail about what AOL had claimed he done to them, when they said he stole millions of credit card’s through the AOL Software Merlin– I called bullshit. And provided proof that stealing a credit card through the MERLIN screen was impossible, it only shows the last 4 numbers. So I assumed AOL was using ‘Virus’ as a fall guy, and felt bad for the kid since he was supposibly 17 and a “retard” (quote kevin lee pulsen; saying he went to a boces for kids with learning disorders), so naturally I gave Kevin the permission to publish what I said, and provided some images from him (images of my own merlin hacks, not viruses ss’ like mike claims- where the fuck would i get those, idk even know him).

Once the article hit the wired.com site I got an IM from a friend asking me why I taught virus, and never would give him stuff. Thats when I read the article and seen how bad my words were manipulated to say that “I taught virus”. For the record I NEVER TAUGHT HIM SHIT, I DID NOT EVEN KNOW THE NUB (If i did teach him one of the first lessons is COVER YOUR FUCKING TRACKS, AT LEAST TUNNEL TO THERE SERVER FOR CHRIST SAKES). This whole media thing brought way to much heat on AOLGang we had just released 3 exploits that were offical AOLGang original exploits (THE AOL.IT & AOL.PK SN exploits, and then sirk found the 189chr SN exploit; the longest AOL SN ever made to date) so being were all over 18 & some had familys we got ready to shut the server down. Thats when “seven” (www.sevenz.net a hosted site on the AOLGang server at the time) had asked if he could “deface” the website, it sorta through me off when he had asked that and I couldnt for the life of me figure out why. He told me why, and I will not put it out there like that but I allowed him. I figured it would not only through the feds off, but the media wouldnt see us as that powerful is they felt we got pwned but some other no name, and all the ddos attempts from the nubs on our server would stop.

That is the truth about what happened to AOLGang, yes I know virus takes credit for it all, truth is he had nothing to do with it. It was all seven under the alias “zodiak” for christ sakes he HAD the login info for the server (NO ONE AT LEAST IN THIS SITUATION HAD ANY SKILLS TO TAKE DOWN A SERVER they didnt have the login information to!, they swore they had my info but the fact is they had some elses (poor guy, im sure he got tons of calls & shit like that; none of these kids had any true SKILLS to pull of anything other than annoying calls). Adrian who at the time was shooting his film & just got done with some trouble regarding the FBI (the day he started filming , the fbi issued a warrant; funny thing is they went to his old house, and his friend tipped him off—stupid feds) so Adrian letme know the consequences of all this and my wife was due to have our son within the next month so he said lets deny it all, infact ill tell them i dont even know u, the feds wont believe it b/c they know better, but itll though everyone else off yet again. So he launched his smear campaign in order to protect me & my future family FOR THAT ADRIAN I OWE ALOT TO YOU. Eventually it all died down and went away, w/o any legal actions. Still to this day I hack, infact secondlife is trying to take me to court for fucking their servers but I COVERED MY TRACKS theres no evidence it was me, the only thing linking me to it was a temp email that is out for the public to use. So thats my story and to this day I hold 5 certifications from SecuriTeam & I am a respected BlackHat, GreyHat, DefCon & DigitalGangster member. I also am a contact for certain sources in the C.C.C. although I am not an OFFICAL member. This blog will be like my journal for online activitys this is your prologe i guess, soon chapter one will start. – Smokey

Source

Database Hack Takes Gullible By Storm

San Francisco — Speculations were rampant during the course of the week, as discussion groups, security newsletters and even headlines jumped at what appeared to be another high-profile hack targetting Redmond based software giant, Microsoft.

Well, there may have been a hack – but Microsoft wasn’t the victim.

It began with a trickle of commentary, but by the end of the week, thousands of internet users were firmly convinced that the very foundation of the internet domain name system had been compromised by, as one news outlet put it “terrorist hackers”.

The reason? Internet-savvy searchers looking up the registration information for Microsoft.com were greeted with the message “MICROSOFT.COM.IS.SECRETLY.RUN.BY.ILLUMINATI.TERRORISTS.NET” – rather unexpected, and certainly amusing – but somewhere between amusement and surprise one important detail was neglected.

What the heck does “terrorists.net” have to do with Microsoft?

The answer, of course, is nothing. A cursory inspection reveals that the whois search has returned multiple records matching the text string “microsoft.com”, and would like the user to choose between them. Through vagaries of the operations of the domain name system, a record fully unrelated to Microsoft was coming back in the search results, merely because it contained a phrase relevant to the search. This is, after all, the nature of most searches.

But then, this is exactly what was intended. According to Adrian Lamo, owner of the terrorists.net domain, “We wanted to cause a bit of amusement. . .we thought it would be something ironic, yet mostly trivial. We figured some people would think it was a hack, and we’d end up with the last laugh, since human nature was the only vulnerability really being exploited.”

A few sheepish security sites quickly downplayed the incident, discussion on the net slowed back to a trickle, and Microsoft seemed to hope that ignoring the whole issue was the best course of action. No glaring new security holes had really been revealed – but at least a few people would be more careful about believing everything they saw on the net – perhaps a more useful lesson than a whole gaggle of IIS bug advisories.

AOL Instant Messenger RIP 10/6/2017

It’s the end of an online era … AOL is officially ending AIM.
“We’ve made the decision that we will be discontinuing AIM effective December 15, 2017,” a rep for the company confirmed.
So, say goodbye to your buddy list … kiss that yellow running man goodbye.
So, why is AIM being laid to rest?
“AIM tapped into new digital technologies and ignited a cultural shift, but the way in which we communicate with each other has profoundly changed,” the company said.
Text messaging. Social media. Etc … it’s obvious it all played a role in AIM’s demise.
Fun while it lasted, though.

R.I.P.

 

The AOL Protocol

The AOL Protocol

When you hear the phrase “The AOL Protocol”, I bet most of you immediately think of FDO, right?
Although FDO is a part of the AOL protocol, it in no way encompasses the big picture. When I use
the term “The AOL protocol”, I refer to how the AOL client and server interact with each other,
how data is prepared, how it is sent, and how it can be manipulated.

There currently exists no formal documentation of the AOL protocol, or at least one that is
publicly available. For this reason, I have taken it upon myself to strip the bits of
information from my feeble mind and write a document with at least basic information about
the AOL protocol. The information included in this document is what I have learned, from
exploration, help from others, and just stumbling upon it. I in no way guarantee the accuracy
of the information contained herein. That said, here is what I know.

(more…)

Read More

From O0O of AOL-Files

I found this old post from O0O of the old AOL-Files.com site posting this on DigitalGangster.com

 

Join Date:  Apr 2007
Location:  NYC
Posts:  1,428

 

its funny how 12-14 years later people remember things so much differently than what you remember. Many of the names here I haven’t seen since bouncing around the PRs in the late `90s. Many of you remember the “leet” SN jackers/suspenders and the progger types….or guys like Kali that cracked OHs to scroll for hours on end…

 

I have a very different perspective, I spent most of my time on IRC or in PRs that many in the scene didn’t know about like “leo9” and “atomdrop”.

 

We had some very smart people in the scene back then, many of them went on to be very successful over the past 12 years….a couple of them I’m glad to still be able to talk to/work with IRL. Some ended up in jail or are dead now. There was a lot of crazy shit going on behind the scenes that kept the scene moving forward, even though there were a couple thousand of us and only some spoke to each other, we were still all tied together through the exploits and programs that a small cadre of really smart dudes figured out and built for others.

(more…)

Read More

Apologetic New Bedford hacker gets 4-year jail sentence cam0

He goes by the online monikers “cam0,” “Freak,” and “leetjones.” But you might know him as the guy who hacked Burger King’s Twitter account, to claim the fast-food chain was bought by its rival McDonald’s. He is also known as the guy who hacked Paris Hilton’s phone and publicly posted racy photos of the socialite.

On Monday, 25-year-old Cameron Lacroix apologized for his crimes, telling a federal judge that he recognized the seriousness of what he thought was innocuous computer hacking. Lacroix pleaded for mercy as he was about to be sentenced for computer fraud.

“My actions let a lot of people down,” Lacroix told US District Court Senior Judge Mark L. Wolf. (more…)

Read More

Early Phishing

Koceilah Rekouche krekouche@pushstart.info

The history of phishing traces back in important ways to the mid-1990s when hacking
software facilitated the mass targeting of people in password stealing scams on America
Online (AOL). The first of these software programs was mine, called AOHell, and it was
where the word phishing was coined. The software provided an automated password
and credit card-stealing mechanism starting in January 1995. Though the practice of
tricking users in order to steal passwords or information possibly goes back to the
earliest days of computer networking, AOHell’s phishing system was the first automated
tool made publicly available for this purpose. 1 The program influenced the creation of
many other automated phishing systems that were made over a number of years. These
tools were available to amateurs who used them to engage in a countless number of
phishing attacks. By the later part of the decade, the activity moved from AOL to other
networks and eventually grew to involve professional criminals on the internet. What
began as a scheme by rebellious teenagers to steal passwords evolved into one of the
top computer security threats affecting people, corporations, and governments.

(more…)

Read More

Exploring Historical & Emerging Phishing Techniques

International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.4, July 2013
DOI : 10.5121/ijnsa.2013.5402 23

Marc A. Rader1 and Syed (Shawon) M. Rahman2, *
1CapellaUniversity, Minneapolis, MN, USA and Associate Faculty, Cochise CollegeAZ, USA
Mrader3@CapellaUniversity.edu
Associate Professor of Computer Science at the University of Hawaii-Hilo, Hawaii,
USA and Part-time Faculty at Capella University, Minneapolis, USA
*SRahman@hawaii.edu
ABSTRACT
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure.
These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most
organizations rely on training to mitigate and reduce risk of non-technical attacks such as social
engineering. Organizations lump IA training into small modules that personnel typically rush through
because the training programs lack enough depth and creativity to keep a trainee engaged. The key to
retaining knowledge is making the information memorable. This paper describes common and emerging
attack vectors and how to lower and mitigate the associated risks.
KEY WORDS
Security Risks, Phishing, Social Engineering, Cross Site Scripting, Emerging Attack Vectors, DNS poising.
1. INTRODUCTION
Phishing is a social engineering technique that is used to bypass technical controls implemented
to mitigate security risks in information systems. People are the weakest link in any security
program. Phishing capitalizes on this weakness and exploits human nature in order to gain access
to a system or to defraud a person of their assets.

(more…)

Read More

Tila Tequila, Hilary Duff Hacked By “Tesla” of Kryogeniks

I couldn’t imagine a crazier way to get yourself some attention from the hacking crew you want to join than taking out one of the biggest “phenomenons” on Myspace then following it up with the Hilary Duff music page, but there you go. The page content doesn’t appear to have had anything malicious placed on it, but the individual behind the hacks couldn’t resist sending out a few bulletins.

 

tila_1

(more…)

Read More