Anonymous nailed 3,392 sites on Webafrica – this is how they got in

The Argentinian hacking group that got into some of Webafrica’s shared hosting servers has taken responsibility for thousands of defacements.

By - February 16, 2016 Share on LinkedIn
Anonymous South Africa TobitowTHA defacements

A hacker who associates with Team Hack Argentino and the Anonymous collective, TobitowTHA, has claimed responsibility for defacing 3,392 South African websites.

Based on the URLs the hacker published, all of the defaced sites were on Webafrica’s shared hosting infrastructure.

Tobitow has told Softpedia that he used a Joomla vulnerability to get in and deface the websites.

This is a common approach to a mass defacement attack on shared hosting servers — exploiting a weakness in one site on the server to gain access to all the sites hosted on it.

OpAfrica

TobitowTHA #OpAfrica defacement

Tobitow said that he did not steal any of Webafrica’s customer data, or information from the defaced websites.

He said that what matters here is that the #OpAfrica message reaches people around the world.

Anonymous announced Operation Africa, or #OpAfrica, at the start of February, saying that it would focus on “a disassembly of corporations and governments that enable and perpetuate corruption on the African continent.”

It would also focus on child abuse, child labour, and Internet censorship within Africa.

While some of the defaced sites remain online and usable, many have been taken offline.

Webafrica was asked for comment on TobitowTHA’s attack on its servers, but it did not respond by the time of publication.

Tobitow's list of defaced Webafrica sites

A screenshot of Tobitow’s list of defaced Webafrica sites

Anonymous hacks and leaks South African government data

Massive number of South African websites hacked by Anonymous

ANC Government on Anonymous hack list

Anonymous hacks SA government database

Share your thoughts

Join the conversation

Connect with Us

androidappletwitterfacebookgoogleplusfeednewsletter

Poll

Have you received unsolicited telesales calls from a mobile network operator?

View Results

Loading ... Loading ...

More News

Pirated movie release types

Piracy

We take a look at the different types of movie releases which populate torrent sites.

Better crime fighting in South Africa with GIS

Thief crowbar criminal vandalism sabotage

GIS can play a vital role in understanding the risk factors for crime, and how crime can be tackled.

The FBI can read all your email, and you’ll never know

FBI emblem

Court cases going on right now are revealing that federal officials can read all your email without your knowledge.

Spectrum auction postponed, BEE requirements relaxed

ICASA logo on glass

ICASA has made several changes to its invitation to apply for 4G spectrum, including postponing it yet again and relaxing its BEE requirements.

Free MyBroadband Newsletter
×