Top 10 Website Hackers for June

Top 10 Website Hackers for June

I wanted to revisit the results of an earlier post this year on how to track website defacements and see how things have changed since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the data:

Here's the Top 10 Website Defacers as of June 2015:

  1. GHoST61: 49
  2. El Moujahidin: 31
  3. r00t-x: 29
  4. Ashiyane Digital Security Team
  5. Best Cracker: 22
  6. TechnicaL: 20
  7. virus3033: 17
  8. A.N.T: 15
  9. KkK1337: 14
  10. MR Error ..: 14

GHoST61 also topped the ranking earlier this year and remains at the top at the moment. Other familiar names are: r00t-x (moved up 4 ranks),TechnicaL (moved up 3 ranks) and Best Cracker (moved up 1 rank). This means that 4 of out of the previous top 10 are still around, while the other 6 weren't listed before.

In terms of organizations containing defaced websites, the Ecommerce Corporation remains the most affected by far. After publishing the last blog post some people rightly questioned whether Ecommerce corporation had just been hit with an attack and I happened to do my report right afterwards. This follow-up data makes it clear that there are systemic problems at the company and how they setup/ respond to incidents.

Stuart Layton

Sevenrooms | HubSpot | MIT Neuro PhD

9 年

This is awesome. Keep up the amazing work!

回复
Monroe D Dowling III, MBA, MPA, BA

Microsoft certified and seasoned consultant with two Master's Degrees including an MBA

9 年

Excellent post John, thank you Monroe D Dowling III

回复
Joaquin Salcedo

?? FS-ISAC Spring Summit, March 9-12 | Strategic Account Director | Empowering CTI teams | Certified in AI Prompt Engineering

9 年

Keep em coming, John! Thanks for the insight.

回复
Tyler Fisher

Former QA / EDR / vulnerability scanner developer working on a red team and vulnerability management team. Slowly building BAS, CTI, QA, and DFIR tools.

9 年

It's wild how much insight you can derive from server banners!

回复

要查看或添加评论,请登录

John Matherly的更多文章

  • Introducing Shodan Trends

    Introducing Shodan Trends

    Shodan was originally designed as a tool to understand how technology use is changing on the Internet. The information…

  • Trends in Internet Exposure

    Trends in Internet Exposure

    More companies are going remote due to COVID-19 and as a result there's been a lot of speculation around how this…

    8 条评论
  • Analyzing Post-WannaCry SMB Exposure

    Analyzing Post-WannaCry SMB Exposure

    It's been a month since the WannaCry ransomware attack wrecked havoc across Windows networks via SMB and I'd like to…

    5 条评论
  • Understanding SSL Usage by Country

    Understanding SSL Usage by Country

    Real-world borders don't necessarily translate to the Internet but it can still reveal useful information as shown by…

    2 条评论
  • 49,153 PB of Memory Available

    49,153 PB of Memory Available

    I've written and presented on the topic of insecure databases for nearly 2 years now. The example I use the most to…

  • 684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

    684.8 TB of Data Exposed by Publicly Accessible MongoDB Servers

    In light of the recent incident of MacKeeper exposing 13 million accounts through a public, unauthenticated MongoDB…

    2 条评论
  • Tracking HTTP/2.0 Adoption

    Tracking HTTP/2.0 Adoption

    HTTP/2.0 is the next version of the protocol powering websites and it promises many improvements over HTTP/1.

    5 条评论
  • Challenges in Taking Things Offline

    Challenges in Taking Things Offline

    Shodan has been in the news for the past few years largely due to the discoveries that security researchers have made…

    8 条评论
  • Hiding in Plain Sight

    Hiding in Plain Sight

    A common reaction I get when talking about devices exposed on the Internet is something like the following:…

    2 条评论

社区洞察

其他会员也浏览了