Anonymous Attacks Suspected Pedophiles Again
Anonymous supporters during a 2008 protest against the Church of Scientology in Los Angeles.
CREDIT: Vincent Diamante/Creative Commons
In its ongoing effort to publicly shame suspected online pedophiles, the Anonymous hacktivists have leaked the user names and passwords allegedly belonging to members of another child porn site.
Released on Pastebin on May 11, the data dump lists what appears to be the information of 11 registered users of Kindzazachan. The hackers said they breached the servers of the suspected illegal child porn website and that the 11 leaked credentials are the beginning of a larger effort to unmask the cybercriminals.
The hackers are calling the campaign "OpDarknetV2," a reference to last year's original Operation Darknet (OpDarknet), during which the cyberactivists took down an illegal porn file-sharing site called Lolita City and its host company, Freedom Hosting, and leaked the user names of more than 1,500 members of the site.
Like Lolita City, Kindzazachan is part of the so-called Darknet, a part of the Internet that is deliberately concealed. Accessible only by traffic-anonymizing add-ons like TOR and frequently used by cybercriminals, Darknet sites offer shady or illegal products and content, including child porn, steroids, fake IDs and even hit man services.
In another OpDarknetV2 Pastebin post, Anonymous acknowledged that last year's Lolita City hack was successful but said it will not sit by while pedophiles websites continue to thrive.
"We will make a stand once again with the destruction of freedom hosting, Lolita City, and any other website geared towards the trading of content with rape/pedophilia," Anonymous wrote.
Anonymous said TOR, the masking browser add-on, is "not our target" and that the child pornography sites are the only ones the hackers are aiming to disrupt.