Last September 28, BurmeseHackers Group Hacked Irrawaddy Online Store twice, and we’ve been discussed about that.

After a month, 27/09/2010: Irrawaddy, Mizzima and the Democratic Voice of Burma (DVB), were attacked on last Monday,

According to their official sites, The attacks coincided with the anniversary of the 2007 “Saffron Revolution.” A similar attack was launched against exile media in September 2008, on the uprising’s first anniversary. Websites were crippled for several days. The Irrawaddy’s website host in the US reported that the volume of the DDoS attack on The Irrawaddy was 4 gigabytes, 3 gigabytes larger than in September 2008.

The massive cyber attacks that shut down The Irrawaddy and Mizzima  came largely from Chinese internet provider addresses, while the attacks on the DVB website, measuring about 120 megabytes per second, came from Russia, Georgia, Israel, Kazakhstan, Ukraine and Vietnam.

In September 2008, the website was also attacked by a DDoS attack. The volume of the DDoS attack on Monday was 2 gigabytes, one gigabyte larger than the attack in Sept. 2008, according to Win Thu, the general manager of The Irrawaddy. Win Thu said that the attack would be short-term, but it has disrupted the daily news production and access by our readers. Hackers began the attack on the English and Burmese website address: www.irrawaddy.org at 1 a.m on Monday and later attacked The Irrawaddy’s mirror website: www.irrawaddymedia.com.

I can’t tell exactly and there’s no comment right now. I just wanna ask myself “Is it a begin of Myanmar Cyber War?”

Explore More

LFI Scanner By GlaDiaT0R

#!/usr/bin/perl #LFI Scanner By GlaDiaT0R #My Mail: the_gl4di4t0r[AT]hotmail[DOT]com #Home Page: DarkGh0st.Com #Greetz To Boomrang_victim, Marwen_Neo & All Tunisian Hackers #www.darkgh0st.net #www.tunisian-power.net More Info http://www.planetcreator.net/planetcreator/perls.php?id=37

What are the various Trojan vectors?

A Trojan may infect any system through Trojan vectors. The most common Trojan vectors are as follows: * Email attachments * Social engineering * NetBIOS remote installation * Physical access

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding