Myanmar Hacker Groups hacked bangladesh sites

Hacker groups from Myanmar ..:: My@nm@r H4ck3rs Unite4m / Myanmar Cyber Army / Blink Hacker Group / Myanmar Cracking Team / Team Destroyer Army ::..  hacked 20 bangladesh web sites yesterday and posted at their official site http://www.blinkhackergroup.org as follow,

You may hack one of Myanmar site (which server is weak, got many time hacked already and abandoned by admin), but following is just a payback from Myanmar Hackers, just 20 sites… Oh yes! 20 BD sites for payback of 1 site hacked!

http://www.cabinet.gov.bd/
http://www.zone-hack.com/mirror/id/86556

http://www.ugc.gov.bd/
http://www.zone-hack.com/mirror/id/86558

http://www.seqaep.gov.bd/
http://www.zone-hack.com/mirror/id/86559

http://www.regtravelagency.gov.bd/
http://www.zone-hack.com/mirror/id/86560

http://www.ntl.gov.bd/
http://www.zone-hack.com/mirror/id/86561

http://www.dae.gov.bd/
http://www.zone-hack.com/mirror/id/86562

http://jks-bd.org/
http://www.zone-hack.com/mirror/id/86563

http://www.bpsc.gov.bd/
http://www.zone-hack.com/mirror/id/86564

http://www.ds.gov.bd/
http://www.zone-hack.com/mirror/id/86565

http://www.bab.org.bd/
http://www.zone-hack.com/mirror/id/86566

http://www.nidw.gov.bd/
http://www.zone-hack.com/mirror/id/86567

http://www.bncu.gov.bd/
http://www.zone-hack.com/mirror/id/86568

http://www.mochta.gov.bd/
http://www.zone-hack.com/mirror/id/86569

http://www.pragotiindustries.gov.bd/
http://www.zone-hack.com/mirror/id/86570

http://www.moca.gov.bd/
http://www.zone-hack.com/mirror/id/86571

http://www.bba.gov.bd/
http://www.zone-hack.com/mirror/id/86572

http://www.icreationbd.com/
http://www.zone-hack.com/mirror/id/86573

http://priade.icreationbd.com/
http://www.zone-hack.com/mirror/id/86574

http://eub.edu.bd/
http://www.zone-hack.com/mirror/id/86575

http://www.doe-bd.org/
http://www.zone-hack.com/mirror/id/86578

http://www.blinkhackergroup.org/2012/07/paypack-as-we-promised.html

Explore More

Password breaking service (Stolen password recovery)

Last month we had about 400 emails asking details on how to break into the email account. The reason many of them put forward are ‘they forgot and got important

What are the various modes of system security testing?

The various modes of system security testing are as follows: 1. Remote network: This mode attempts to simulate an attack launched over the Internet. The primary defenses that must be

What are the user authentications supported by the SSH-2 protocol?

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,