• Register

milw0rm is a group of “hacktivists” best known for penetrating the computers of the Bhabha Atomic Research Centre (BARC) in Bombay, the primary nuclear research facility of India, on June 3, 1998. The group conducted hacks for political reasons, including an anti-nuclear agenda and peace message that it spread on hacked websites. The group’s logo featured the slogan “Putting the power back in the hands of the people.”

The BARC attack generated heated debate on the security of information in a world prevalent with countries developing nuclear weapons and the information necessary to do so, the ethics of “hacker activists” or “hacktivists,” and the importance of advanced security measures in a modern world filled with people willing and able to break into insecure international websites.

Little is known about the members of milw0rm. The international hacking team went by the aliases of JF, Keystroke, ExtreemUK, savec0re, and VeNoMouS. VeNoMouS, 18, hailed from New Zealand, ExtreemUK and JF, 18, from England, and Keystroke and Savec0re, 17 from the US. To date, none of the group have come forward with their real names or identities, and investigations of the incident by the CIA and FBI or any other intelligence organizations proved fruitless in deciphering their identities, which were well-hidden. However, numerous people who were not a part of milw0rm have come forward saying that they were responsible for the hacks. Their claims have been discredited.

JF went on to achieve a modicum of notoriety when MTV “hacked” its own website intentionally and graffitied the words “JF Was Here” across the page, at the same time that JF was under investigation for the milw0rm attacks by Scotland Yard. Hundreds of pages hosted on MTV.com sported the new JF logo, including one page that read, “JF was here, greets to milw0rm”.

VeNoMouS claimed that he learned to crack into systems from Ehud Tenenbaum, an Israeli hacker known as The Analyzer.

BARC Attack 

Four days before the incident, the five permanent members of the United Nations Security Council, the US, Russia, United Kingdom, France and China, denounced both India and Pakistan for unilaterally declaring themselves nuclear weapons states. The day before the attack, Jacques Gansler, US undersecretary of defense for acquisition and technology, warned a military conference that teenage hackers posed “a real threat” to national security.

On the night of June 3, 1998 from their workstations on three continents, the group used a US military .mil machine to break into the LAN, or local area network, of BARC and gained root access. The center’s website, connected to the LAN, and their firewall was not secured enough to prevent the group from entering and gaining access to confidential emails and documents. The emails included correspondence between the center’s scientists relating to their development of nuclear weapons. They then posted a statement of anti-nuclear intentions on the center’s website.

In the process of the break-in, the multinational group of teenagers — from the United States, United Kingdom and New Zealand — gained access to five megabytes of classified documents pertaining to India’s nuclear weapons program. Savec0re erased all the data on two servers as a protest against the center’s nuclear capabilities. To display their security breach publicly, they changed the center’s webpage to display a mushroom cloud along with an anti-nuclear message and the phrase “Don’t think destruction is cool, coz its not”.

Milw0rm then came forward with the security flaws they exploited in BARC’s system, along with some of the thousands of pages of documents they had lifted from the server, concerning India’s last five nuclear detonations.

The group’s purpose for the attack was to protest nuclear testing, according to Savec0re, VeNoMouS and JF, in their correspondence with Wired’s reporter James Glave

Attack Aftermath

The security breach was first reported by Wired News. Members of the group claimed credit by emailing Wired reporter James Glave with documents they had obtained from the BARC servers as proof.

After first denying that any incident had occurred, BARC officials admitted that the center had indeed been hacked and emails had been downloaded. An official at BARC downplayed the severity and importance of the incident announcing that the security flaw resulted from “a very normal loophole in Sendmail,” while going on to state that the center had not bothered to download a new version of the Sendmail program, responsible for the center’s email servers. The center also admitted that after milw0rm’s breach, the site had been hacked into again, this time with less severe consequences. Forbes wrote that perhaps up to 100 hackers had followed milw0rm’s footsteps into the BARC servers once they were revealed as insecure.The website was shut down while its security was upgraded. Later, a senior US government official told ZDNet that the Indians had known about the flaw and had chosen to ignore it, creating the opportunity for milw0rm to root the servers. BARC officials said that none of the emails contained confidential information, the group did not destroy data, and that the computers they have that contain important data were isolated from the ones broken into.

Nevertheless, the breach was a severe one and had the potential to cause an incident of international proportions. Forbes called it “potentially the most devastating” hacking incident of 1998.

After the attack, members of the group participated in an anonymous Internet Relay Chat (IRC) chat with John Vranesivich, the founder of hacking news website Anti-Online. Keystroke explained how if he wanted to, he could have sent threatening emails from the Indian email server to a Pakistani email server. If the group had possessed malicious intentions, the consequences for both south Asian countries could have been catastrophic.

For these reasons, the milw0rm attack caused other groups to heighten their security to prevent invasion by hackers. The U.S. Army announced, without giving evidence as to why they believed this to be the case, that the hacks might have originated in Turkey, noting that “Turkey is the primary conduit for cyber attacks.” A senior US official said that the CIA had obtained the material that milw0rm had purloined and was reviewing it– the official did not mention how the CIA obtained this information.

Later, Wired News revealed that an Indian national and self-proclaimed terrorist, Khalid Ibrahim, had approached members of milw0rm and other hacker groups on IRC– including Masters of Downloading and the Noid– and attempted to buy classified documents from them. According to savec0re, Ibrahim threatened to kill him if the hacker did not turn over the classified documents in question.

The Electronic Disturbance Theater released a statement in support of JF, applauding him for his hacktivism and maintaining that computer break-ins of this sort were not cyber-terrorism as some claim.

The event received wide national coverage, with reports by CNN, MSNBC and the Associated Press in the days following.

Other Attacks

One month after the BARC incident, in July 1998, milw0rm hacked the web hosting company Easyspace, putting their anti-nuclear mushroom cloud message on more than 300 of Easyspace’s websites.

Wired reported that this incident was perhaps the “largest ‘mass hack’ ever undertaken.” Some of the sites hacked in the incident were for the World Cup, Wimbledon, the Ritz Casino, Drew Barrymore, and the Saudi royal family. The text placed on the sites read in part, “This mass takeover goes out to all the people out there who want to see peace in this world… This tension is not good, it scares you as much as it scares us. For you all know that this could seriously escalate into a big conflict between India and Pakistan and possibly even World War III, and this CANNOT happen… Use your power to keep the world in a state of PEACE.”

While scanning a network for weaknesses, members of the group came across EasySpace, a British company which hosted many sites on one server. Along with members of the fellow hacking group Ashtray Lumberjacks, milw0rm had the revised mushroom cloud image and text on all of Easyspace’s websites in less than one hour.


milw0rm Quotes - 

“The world is lucky we’re so nice.”
-Keystroke

“It’s ironic that India has weapons capable of destroying the world, but they can’t secure a little web server which is connected to their networks.”
-Keystroke

“If you’re gonna amass data which can take many lives … at least secure it.”
-savec0re

“I’m only young; I don’t want a hostile world on the edge of a nuclear conflict.”
-JF

“We should be moving towards world peace in the millennium, and nuclear warfare [and] testing is NO way forward. It can destroy the world.”
-JF

The full text of the milw0rm-revised BARC website:

oh gn0, like this is what happens if j00 play with atomic energy!#@! It g0es b00m@#@#@# so PLEEEZE, do not fuck around, didn’t you parents ever teach you manners? I like the world in its current state (i guess), well its better than the world would be if the b0mb went b00m. think about it k1dz, its not clever, its not big, so don’t think destruction is cool, coz its not. If a nuclear war does start, you will be the first to scream. You all saw the movie WARGAMES right? well…. That could have been us$#@ So India, LISTEN TO WISE OLD MILWORM …. You do not need nuclear weapons in the 1990s!#@! STOP THE SHIT Owned Savec0re - JF - VeNoMouS JF - Hamst0r - Keystoke - savec0re - ExtreemUK

milw0rm - BARC website

 

CORE Impact Professional

Logo Core ImpactCORE Impact Professional is the most comprehensive software solution for assessing and testing security vulnerabilities throughout your organization.

 
 

Read More...

IBM Security AppScan

Logo IBM Rational AppScanIBM Rational AppScan Enterprise is a scalable solution to help resolve application security vulnerabilities, offering recommendations to simplify remediation.

 

Read More...

HP WebInspect

Logo - HP WebInspectHP WebInspect gives security professionals and security novices alike the power and knowledge to quickly identify and validate critical, high-risk security vulnerabilities.

 

Read More...

Acunetix WVS

logo acunetix web application securityAcunetix Web Vulnerability Scanner (WVS) is an automated web application security testing tool that audits web applications by checking for hacking vulnerabilities. 

 

Read More...

w4rri0r - Hacking Is Not A Crime - It's an art of Awareness

\/ w4rri0r - Hacking Is Not A Crime - It's an art of Awareness \/ -  w4rri0r work in the dark, w4rri0r do what w4rri0r can, w4rri0r give what w4rri0r have, w4rri0r doubt is w4rri0r passion and w4rri0r passion is w4rri0r task. The rest is the madness of art \/ w4rri0r \/ 

\/ w4rri0r.com \/ are the great resource for information security professionals and researcher. \/ w4rri0r \/ offers a extensive variation of information security services that include SECURITY EXPLOITS (Bug or Vulnerability), SECURITY ADVISORIES (Security Alerts), SECURITY RESEARCHER TOOLBOX (Freeware, Shareware & Open-Source), SHELLCODE (Attacker Controller - Chunk of Data), SECURITY TRAINING (Educational Purpose), SECURITY NEWS (Security Recent or Important Events) and with this group you can be assured that you’re in the right hands. \/ w4rri0r gr0up \/  efforts being endorsed and appreciated by administrators, security researchers and members of various underground hacking groups and communities worldwide.

\/ w4rri0r mission \/ are to make the information systems more secure, more aware, more reliable and protect against possible security breaches.