Phineas Fisher Fingered: Hacking the Turkish Government

A notorious hacker has claimed responsibility for hacking Turkey’s ruling party, the AKP, and stealing more than 300,000 internal emails and other files.

The hacker, who’s known as Phineas Fisher and has gained international attention for his previous attacks on the surveillance tech companies FinFisher and Hacking Team, took credit for breaching the servers of Turkey’s ruling party, the Justice and Development Party or AKP.

“I hacked AKP,” Phineas Fisher, who also goes by the nickname Hack Back, said in a message he spread through his Twitter account recently.

The hacker didn’t provide any definitive evidence to support his claims, but he posted a link to a series of stolen files totaling more than 100 gigabytes.

Recently WikiLeaks began publishing emails stolen from the party of the Turkish President Recep Tayyip Erdogan. The anti-secrecy organization led by Julian Assange said it recently received the files from a source “who is not connected, in any way, to the elements behind the attempted coup [in Turkey], or to a rival political party or state.”

That source, it appears, was none other than Phineas Fisher.

“What better way to celebrate the release of VICE's Cyberwar than by attacking a NATO member?” Phineas Fisher told me in an email, referring to VICELAND’s new documentary series on hacking and cybersecurity, which this week featured an exclusive interview with the hacker.

Phineas Fisher explained in his message that he attacked AKP “because I support the society people are trying to build in Rojava and Bakur, and they're being attacked by Turkey,” referring to two Kurdish anti-capitalist autonomous regions, which are located between Turkey and Syria. ”I don't see leaking as an end in itself, so I was talking with people in Rojava and Bakur to see how best to use the access I'd gotten.”

”I don't see leaking as an end in itself, so I was talking with people in Rojava and Bakur to see how best to use the access I'd gotten.”

Earlier this year, the hacker claimed to have robbed a bank in a cyber heist and sent 10,000 euros in bitcoin to the Rojava Plan, an organization that promotes “gender liberation, direct democracy, and a free and ecological society” in Rojava.

The hacker hinted that there was some sort of miscommunication when WikiLeaks received the files, and the organization jumped the gun in publishing them.

“To be fair to WikiLeaks, they didn't know I was still in AKP's network downloading files at the time they announced they were publishing,” Phineas Fisher wrote in his message. “But they did know that the source who had given them the file was asking them to wait.”

WikiLeaks did not immediately respond to a request for comment. And Phineas Fisher declined to answer more questions regarding the hack.

The leak is being hosted also by the independent security researcher Thomas White, also known as TheCthulhu.

After the publication of the emails recently, Turkey reacted by blocking WikiLeaks. How they’ll react to this new, apparently more extensive leak, remains to be seen.

Motheboard

 

 

« Deep Mystery: Looking For MH370
DDoS Attacks Shuts Down Pro-ISIS Websites »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NICE Systems

NICE Systems

NICE Systems provide software solutions to ensure compliance, fight financial crime, and safeguard people and assets.

GuardKnox

GuardKnox

GuardKnox protects the users of connected vehicles against threats that can endanger their physical safety and the safety of their personal information.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Araxxe

Araxxe

Araxxe delivers Revenue Assurance, End-to-End Billing Verification and Interconnect Fraud Detection solutions to communication companies worldwide.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Casque SNR

Casque SNR

CASQUE SNR is the next generation of Identity Assurance that has potential to supersede existing solutions. It provides Identity Assurance for both people and things.

Secure Digital Solutions (SDS)

Secure Digital Solutions (SDS)

Secure Digital Solutions is a leading consulting firm in the business of information security providing cyber security program strategy, enterprise risk and compliance, and data privacy.

NOW Insurance

NOW Insurance

NOW Insurance provides small business owners and other professional classes with a seamless purchasing experience for general liability, professional liability, and cybersecurity insurance coverage.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

Code Intelligence

Code Intelligence

Code Intelligence offers a platform for automated software security testing to help developers make their software more robust and secure.

NetWitness

NetWitness

NetWitness empowers security teams to rapidly detect today’s targeted and sophisticated attacks with unparalleled visibility.

Cool Waters Cyber

Cool Waters Cyber

Cool Waters Cyber manage cyber security governance, risk and compliance.

Red Helix

Red Helix

Red Helix (formerly Phoenix Datacom) is a market leader in network performance and cyber security.

Codenotary

Codenotary

Codenotary provide a comprehensive suite of verification and enforcement services to guarantee the integrity of your software throughout its entire lifecycle.

Trovent Security

Trovent Security

Trovent was founded with a clear goal: to support medium-sized companies in significantly increasing their IT security level.

Cyber Unicorns

Cyber Unicorns

Cyber Unicorns is a cyber security consultancy created to help drive cyber security outcomes in the small to medium-sized business space.