SlideShare a Scribd company logo
Hacktivism for profit
and glory
Using technology offensively and
profitably against world powers and
major corporations.
One person can change the world.
• You can easily fight powers
that appear bigger and
stronger than you.
• I make lots of history,
influencing nation states and
Fortune 500 companies.
• I do this with no external
capital or influence.
• Everybody who tried to stop
me failed.
Andrew “weev” Auernheimer
Professional hacktivist.
Why I became a hacktivist
• The status quo is not
fair to hackers
• Tech industry
billionaires can’t even
buy influence.
• America makes its
hackers suffer greatly:
Swartz, Moore, Love
Changing the world is profitable.
• Know the outcome of an economic event?
Profit in financial markets.
• In financial markets, you only have to be right
for a few hours.
• Know the outcome of an election? You can
make profit in prediction markets.
I started small.
• Pick a venture
capitalist that funds
tech startups
• Announce your
presence.
• Destroy his portfolio
company by company
until he pays you to
go away.
2008: First nation-state attack
2009: First Fortune 500 attack
• XSRF: Cross site request forgery – no unique
token to scrape to perform command on a
site. Site wrongly trusts user’s browser.
• Can we use this to troll a corporation and shift
a its value by billions of dollars?
Amazon had a XSRF-vuln
• There was a “Report Inappropriate Content”
button on every Amazon page for logged in
users that was a simple HTTP GET with any
product ID at the end.
• Function automatically removed content from
the search rankings if it got enough reports. It
was still sold, but you couldn’t search for it.
This was so easy. Really bad code.
• An enumerated list of gay book product IDs:
Reported all gay books as
inappropriate thousands of times.
• Put a hidden iframe on many websites that
did a 302 redirect to the report as
inappropriate function.
• Used cookies from bot-registered Amazon
accounts to report it myself
• Net effect: you couldn’t search for gay faggot
books on Amazon anymore.
What next? Make markets react.
• Contact gay bloggers, say Amazon was
censoring homosexuals: #amazonfail
This bug was stupid.
• I couldn’t have ever sold it to anyone.
• Amazon wouldn’t reward me for reporting it.
• Objective market value was $0
• But I used it to drop Amazon’s market cap by
$3.2 BILLION dollars for long enough for a
short position to be profitable.
2010: Second Fortune 500 attack
• June of 2010, first Apple iPad 3G released,
exclusive to AT&T.
• On iPad billing/registration server a simple
HTTP GET with no authentication.
• Integer in URL is the integrated circuit card
identifier (ICCID) – unique ID for device SIM
• Takes ICCID and returns email of registered
user.
Oops.
• Apple and AT&T made this for convenience, so
when you visit the billing site it would
automatically fill in the email of your device to
login faster.
• It’s just an HTTP GET, and the ID is just a
number. What they really did was publish a
complete list of iPad users on the Internet.
Exploitation
• Once again, very simple. Numerical IDs are in
sequence. As simple as let count, while true, do curl
$i, done.
• I have a full list of Apple iPad 3G owner emails and
the corresponding ICC-IDs.
• What can I do now?
Risk assessment
• If I were a bad guy, I would send a Safari
exploit to every iPad. (and we had one)
• The IMSI can be derived from the ICCID
(unique to AT&T) which would allow for IMSI
catchers and man in the middle attacks.
• Targeted advertisements: iPad accessories.
• I could do any of these things, but I’d rather
do the right thing and change the world.
Public disclosure.
• We had an name from
offensive Internet
meme: Goatse Security.
If you have not heard of
the Goatse meme do
not look it up.
• “Subsidiary of” GNAA
troll organization
• Adds embarrassment for
AT&T and Apple.
I disclose the issue to a journalist.
If you want to change the world:
social sophistication is equally as
needed as technical sophistication.
Surprise! I
Now the hard part comes
• Kidnapped thousands of
kilometers to foreign
territory, beaten by US
Marshalls along the way
• The parts of America that
the feds bring you to are
hell on earth
• Banned from the Internet
for years
Liberty must be defended.
• I accessed a public
webserver and told a
journalist about what
was on it.
• This is unequivocally not
criminal activity.
• If accessing a public
webserver is a crime the
Internet only contains
criminal activities.
• None of this mattered to
American courts.
Andrew Auernheimer - Hacktivism for profit and glory
Free at last
Eventually a higher
court admitted my
conviction was based
on lies from the FBI
and DOJ and violated
my rights.
Total time lost:
39 months
Let’s do more of this.
Have it your way USA, I’ll go.
August 2016: methods are mainstream
• Muddy Waters now
using software vulns
for financial
intelligence
• The FBI said my desire
to short sell off of vuln
was evidence of
criminal intent, and
now it is a common
industry practice.
2016: Latest nation-state attack
Takeaway
• Technology enables agile individuals to act
with more efficacy than the world’s biggest
empires.
• Every day that goes by, smaller entities grow
more effective than big entities.
• Be relentless, you’ll eventually be proven right
and see your positions legitimized.
Fin.
@rabite
weevlos
weev0
weev

More Related Content

PPTX
Helping Government Keep Up with Moore's Law
PDF
Алексей Старов - Как проводить киберраследования?
PPT
Andrew Dodson - Smart grids are stupid ideas
PPTX
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
PPTX
Дмитрий Момот - Современные способы атак на сотовые сети, их последствия и пр...
PDF
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
PPTX
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
PPTX
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...
Helping Government Keep Up with Moore's Law
Алексей Старов - Как проводить киберраследования?
Andrew Dodson - Smart grids are stupid ideas
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Дмитрий Момот - Современные способы атак на сотовые сети, их последствия и пр...
Alfonso De Gregorio - Vulnerabilities and Their Surrounding Ethical Questions...
Андрей Аваданей - Как с помощью honeypot защитить критические активы компании
Лариса Матвеева - Хакеры и уголовная ответственность: как избежать негативных...

Similar to Andrew Auernheimer - Hacktivism for profit and glory (20)

PPTX
ACCA Cybersecurity Competition 1st Place Presentation (2018)
PDF
article cybersecurity must B2B metaverse
PPTX
Chapter four AI and modern world part two.pptx
PPTX
2013.05.16 cfaa powerpoint for ima.v1
PDF
Mike Hearn - Beyond Tradenet
PDF
Legitimate Millionaire
PDF
Regulation and Innovation, Yared Haile-Meskel
PDF
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
PDF
Cyber Security
PPT
Search
PPTX
Cyber crime: A Quick Survey
PDF
Conclusion - How To Write An Essay - LibGuides At Univers
PDF
Nation-State Attacks On PKI
PDF
State of Cyber Crime in Banking Sector Today: Threats and Solutions
PPTX
Disrupt you! strategies for billion dollar success in the era of endless inn...
PDF
dark-web-and-cybercrime.pdf
PDF
What went right or wrong on election day - Nov 8th, 2016 USA
PPT
Hum 140: Social Media - Cyber fraud
PPTX
Cyber Crime
PPT
LECTURE 4 - Cyberculture
ACCA Cybersecurity Competition 1st Place Presentation (2018)
article cybersecurity must B2B metaverse
Chapter four AI and modern world part two.pptx
2013.05.16 cfaa powerpoint for ima.v1
Mike Hearn - Beyond Tradenet
Legitimate Millionaire
Regulation and Innovation, Yared Haile-Meskel
Tik Tok's Sleight of Hand: The Trojan Horse invited to reside on our smartpho...
Cyber Security
Search
Cyber crime: A Quick Survey
Conclusion - How To Write An Essay - LibGuides At Univers
Nation-State Attacks On PKI
State of Cyber Crime in Banking Sector Today: Threats and Solutions
Disrupt you! strategies for billion dollar success in the era of endless inn...
dark-web-and-cybercrime.pdf
What went right or wrong on election day - Nov 8th, 2016 USA
Hum 140: Social Media - Cyber fraud
Cyber Crime
LECTURE 4 - Cyberculture

More from HackIT Ukraine (20)

PPTX
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
PPTX
"В поисках уязвимостей мобильных приложений", Алексей Голубев
PPTX
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
PDF
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
PDF
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
PDF
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
PPTX
"Как ловят хакеров в Украине", Дмитрий Гадомский
PPTX
"Security Requirements Engineering", Oleksii Baranovskyi
PDF
"Наступну атаку можна попередити", Олександр Чубарук
PPTX
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
PPTX
"How to make money with Hacken?", Dmytro Budorin
PPTX
"Using cryptolockers as a cyber weapon", Alexander Adamov
PPTX
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
PPTX
"Bypassing two factor authentication", Shahmeer Amir
PPTX
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
PPTX
"Introduction to Bug Hunting", Yasser Ali
PDF
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
PDF
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
PDF
Владимир Махитко - Automotive security. New challenges
PPTX
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?
"CyberGuard — проект государственно-частного партнерства по созданию киберцен...
"В поисках уязвимостей мобильных приложений", Алексей Голубев
"Безопасность и надежность ПО в техногенном мире", Владимир Обризан
"Технология блокчейн: новые возможности и новые уязвимости", Дмитрий Кайдалов
"Безопасные Биткоин-транзакции без специального оборудования", Алексей Каракулов
"Growth hack в маркетинге и бизнесе", Максим Мирошниченко
"Как ловят хакеров в Украине", Дмитрий Гадомский
"Security Requirements Engineering", Oleksii Baranovskyi
"Наступну атаку можна попередити", Олександр Чубарук
"Preventing Loss of Personal Data on a Mobile Network", Oleksii Lukin
"How to make money with Hacken?", Dmytro Budorin
"Using cryptolockers as a cyber weapon", Alexander Adamov
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
"Bypassing two factor authentication", Shahmeer Amir
"Системы уникализации и идентификации пользователей в сети. Методы защиты от ...
"Introduction to Bug Hunting", Yasser Ali
"Hack it. Found it. Sell it. How hackers can be successful in the business wo...
"15 Technique to Exploit File Upload Pages", Ebrahim Hegazy
Владимир Махитко - Automotive security. New challenges
Вадим Ковкин - Безопасный коммуникатор: миф или реальность?

Recently uploaded (20)

PPTX
Sustainable Sites - Green Building Construction
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PDF
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPT
Project quality management in manufacturing
PDF
composite construction of structures.pdf
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
PDF
Digital Logic Computer Design lecture notes
PDF
Well-logging-methods_new................
PPTX
CH1 Production IntroductoryConcepts.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
DOCX
573137875-Attendance-Management-System-original
PPTX
Geodesy 1.pptx...............................................
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
Construction Project Organization Group 2.pptx
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
Sustainable Sites - Green Building Construction
CYBER-CRIMES AND SECURITY A guide to understanding
Evaluating the Democratization of the Turkish Armed Forces from a Normative P...
Operating System & Kernel Study Guide-1 - converted.pdf
Project quality management in manufacturing
composite construction of structures.pdf
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
BMEC211 - INTRODUCTION TO MECHATRONICS-1.pdf
Digital Logic Computer Design lecture notes
Well-logging-methods_new................
CH1 Production IntroductoryConcepts.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Model Code of Practice - Construction Work - 21102022 .pdf
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
573137875-Attendance-Management-System-original
Geodesy 1.pptx...............................................
bas. eng. economics group 4 presentation 1.pptx
Construction Project Organization Group 2.pptx
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd

Andrew Auernheimer - Hacktivism for profit and glory

  • 1. Hacktivism for profit and glory Using technology offensively and profitably against world powers and major corporations.
  • 2. One person can change the world. • You can easily fight powers that appear bigger and stronger than you. • I make lots of history, influencing nation states and Fortune 500 companies. • I do this with no external capital or influence. • Everybody who tried to stop me failed.
  • 4. Why I became a hacktivist • The status quo is not fair to hackers • Tech industry billionaires can’t even buy influence. • America makes its hackers suffer greatly: Swartz, Moore, Love
  • 5. Changing the world is profitable. • Know the outcome of an economic event? Profit in financial markets. • In financial markets, you only have to be right for a few hours. • Know the outcome of an election? You can make profit in prediction markets.
  • 6. I started small. • Pick a venture capitalist that funds tech startups • Announce your presence. • Destroy his portfolio company by company until he pays you to go away.
  • 8. 2009: First Fortune 500 attack • XSRF: Cross site request forgery – no unique token to scrape to perform command on a site. Site wrongly trusts user’s browser. • Can we use this to troll a corporation and shift a its value by billions of dollars?
  • 9. Amazon had a XSRF-vuln • There was a “Report Inappropriate Content” button on every Amazon page for logged in users that was a simple HTTP GET with any product ID at the end. • Function automatically removed content from the search rankings if it got enough reports. It was still sold, but you couldn’t search for it.
  • 10. This was so easy. Really bad code. • An enumerated list of gay book product IDs:
  • 11. Reported all gay books as inappropriate thousands of times. • Put a hidden iframe on many websites that did a 302 redirect to the report as inappropriate function. • Used cookies from bot-registered Amazon accounts to report it myself • Net effect: you couldn’t search for gay faggot books on Amazon anymore.
  • 12. What next? Make markets react. • Contact gay bloggers, say Amazon was censoring homosexuals: #amazonfail
  • 13. This bug was stupid. • I couldn’t have ever sold it to anyone. • Amazon wouldn’t reward me for reporting it. • Objective market value was $0 • But I used it to drop Amazon’s market cap by $3.2 BILLION dollars for long enough for a short position to be profitable.
  • 14. 2010: Second Fortune 500 attack • June of 2010, first Apple iPad 3G released, exclusive to AT&T. • On iPad billing/registration server a simple HTTP GET with no authentication. • Integer in URL is the integrated circuit card identifier (ICCID) – unique ID for device SIM • Takes ICCID and returns email of registered user.
  • 15. Oops. • Apple and AT&T made this for convenience, so when you visit the billing site it would automatically fill in the email of your device to login faster. • It’s just an HTTP GET, and the ID is just a number. What they really did was publish a complete list of iPad users on the Internet.
  • 16. Exploitation • Once again, very simple. Numerical IDs are in sequence. As simple as let count, while true, do curl $i, done. • I have a full list of Apple iPad 3G owner emails and the corresponding ICC-IDs. • What can I do now?
  • 17. Risk assessment • If I were a bad guy, I would send a Safari exploit to every iPad. (and we had one) • The IMSI can be derived from the ICCID (unique to AT&T) which would allow for IMSI catchers and man in the middle attacks. • Targeted advertisements: iPad accessories. • I could do any of these things, but I’d rather do the right thing and change the world.
  • 18. Public disclosure. • We had an name from offensive Internet meme: Goatse Security. If you have not heard of the Goatse meme do not look it up. • “Subsidiary of” GNAA troll organization • Adds embarrassment for AT&T and Apple.
  • 19. I disclose the issue to a journalist.
  • 20. If you want to change the world: social sophistication is equally as needed as technical sophistication.
  • 22. Now the hard part comes • Kidnapped thousands of kilometers to foreign territory, beaten by US Marshalls along the way • The parts of America that the feds bring you to are hell on earth • Banned from the Internet for years
  • 23. Liberty must be defended. • I accessed a public webserver and told a journalist about what was on it. • This is unequivocally not criminal activity. • If accessing a public webserver is a crime the Internet only contains criminal activities. • None of this mattered to American courts.
  • 25. Free at last Eventually a higher court admitted my conviction was based on lies from the FBI and DOJ and violated my rights. Total time lost: 39 months
  • 26. Let’s do more of this.
  • 27. Have it your way USA, I’ll go.
  • 28. August 2016: methods are mainstream • Muddy Waters now using software vulns for financial intelligence • The FBI said my desire to short sell off of vuln was evidence of criminal intent, and now it is a common industry practice.
  • 30. Takeaway • Technology enables agile individuals to act with more efficacy than the world’s biggest empires. • Every day that goes by, smaller entities grow more effective than big entities. • Be relentless, you’ll eventually be proven right and see your positions legitimized.