Anonymous Hacks Thai and Turkey Police Stations

Anonymous hackers are contesting the decision of a Judge in Thailand, in the Koh Tao murder case.

On September 15, 2014, two British back papers, Hannah Witheridge, 23 and David Miller, 24, were killed on the Thai Island of Koh Tao. Soon after the crime, Thai police arrested two Myanmar migrant workers, which a Thai court sentenced to death in December 2015.

According to a 37-minute video posted on YouTube and Facebook, the Anonymous hacker collective has taken responsibility for cyber-attacks against 14 Thai police websites.

Affected websites include the Bangkok Metropolitan Police Bureau, the General Staff Division of Royal Thai Police, and numerous regional police stations. Hackers broke into Thai police Web servers and left a message on each one saying: "Failed Law. We Want Justice! #BoycottThailand."

Anonymous accuses Thai police of malevolence, flawed criminal investigations

According to statements made in the video, the hacking group is accusing Thai law enforcement of corruption, sentencing the two innocent workers in haste, only to clear up its reputation as a tourist-friendly country.

"Thai police have accused innocent people before, and would rather blame foreigners or migrants for such crimes so as to protect their tourism industry then accuse their own Thai locals, that may deter tourists from choosing Thailand as their holiday destination," said an Anonymous representative, accusing the government of using the murder sentences as media stunts.

The group also claims to have looked into the rape & murder case brought against the two migrant workers, Wai Phyo and Zaw Lin. The hackers compared documents obtained after breaching the police websites, to previous rape & murder investigations against other foreigners (like the Bali nine and Schapelle Corby sentences), and found multiple similarities.

These similarities include the loss of crucial DNA evidence, torture accusations against Thai police, crime scene contamination, ignoring autopsy reports, and many others.

Anonymous Hacks Turkish Police and Leaks Data

Also the year 2015 was a difficult year for Turkey due to the uncertain situation on the ground and cyber attacks conducted by Anonymous on high-profile targets such as banks and national domain registrar. 

Now hacktivist collective Anonymous claims to have dumped online a huge database belonging to Turkey’s General Directorate of Security (EGM) in response to “various abuses” by the Turkish government in recent months.

The hacker, believed to be using the pseudonym ROR [RG], chose to release the police files via The Cthulhu website – which has hosted Anonymous-backed leaks in the past including, most notably, the contents of a serious hack against a major US police union earlier this year.

The person who uploaded the database recently said he received it from a hacker who had “persistent access to various parts of the Turkish government infrastructure for the past two years.”

The compressed file is expected to weigh in at some 2.8GB, and the uncompressed version at around 17.8GB.

Softpedia: http://bit.ly/1owVn0z
Hackread: http://bit.ly/1Tkf2MV
IB Times: http://bit.ly/1PCosAY

« NSA AI Technology May Have Targeted Innocents
Clinton Calls Cybersecurity ‘One of the Most Important Challenges’ for the Next U.S. President »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LogonBox Software

LogonBox Software

LogonBox Software specialises in producing a cost-effective range of Network Security and Identity Management software solutions for all sizes of Enterprise.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Cymbel

Cymbel

Cymbel provides businesses and government agencies with the tools and expertise they need to manage the most complex security and compliance challenges.

Glilot Capital Partners

Glilot Capital Partners

Glilot Capital Partners is an Israeli seed and early-stage VC. We specialize in businesses which disrupt enterprise technology, mainly in the fields of AI, big data and cybersecurity.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Cypherix

Cypherix

Cypherix is tightly focused on cryptography and data security. We leverage our expertise to deliver state-of-the-art, world-class encryption software packages.

Myota

Myota

Myota intelligently equips each file to be resilient and achieve Zero Trust-grade protection. Withstand ransomware and data breach attacks. Reduce data restoration time and effort.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

RAND Corporation

RAND Corporation

The RAND Corporation is a non-profit institution that helps improve policy and decision making through research and analysis.

Concorde Technology Group

Concorde Technology Group

Concorde Technology Group is one of the UK’s leading IT support and services providers, delivering cost-effective and innovative IT solutions to businesses across the country.

Network Contagion Research Institute (NCRI)

Network Contagion Research Institute (NCRI)

NCRI provides pioneering technology, research, and analysis to identify and forecast cyber-social threats targeting individuals, organizations, and communities.

Unit 42

Unit 42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.

aFFirmFirst

aFFirmFirst

aFFirmFirst is a unique software solution offering a simple yet effective way for businesses to protect and control their online images and logo, as well as allowing one-click website verification.

Methods

Methods

Methods is the leading digital transformation partner for the UK public sector. We care deeply about making our public services better and have been doing this for over 28 years.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

Inveo Group

Inveo Group

Inveo group is the Italian leader for the management of privacy and data protection issues.