The Jester

From Wikipedia, the free encyclopedia
The Jester
th3j35t3r
Nationality American
Occupation Grey hat hacktivist
Known for Hacking Anti-American, jihadist and homophobic websites
Website
http://jesterscourt.cc/

The Jester (also known by the leetspeak handle th3j35t3r[1]) is a computer vigilante[2] who describes himself as grey hat[3] hacktivist.[4] He claims to be responsible for attacks[4] on WikiLeaks,[5] 4chan,[6] Iranian President Mahmoud Ahmadinejad,[5] and Islamist websites.[7] He claims to be acting out of American patriotism.[8] The Jester uses a denial-of-service (DoS) tool known as "XerXeS", that he claims to have developed.[5] One of The Jester's habits is to tweet "TANGO DOWN" on Twitter whenever he successfully takes down a website.[6]

History

Identity and communication

The Jester first appeared on Twitter where he announced his attack on the Taliban website alemarah.info on January 1, 2010. On June 26, 2010 he established his WordPress blog "Jester's Court".[9] The Jester also communicates via his I2P IRC channel #jester and cautions these are the only three authentic methods of communication from him: "As per usual, because of the large amount of imposters trying to pass themselves off as me I will only speak in THREE places, here via this blog, my twitter and the i2p IRC network outlined above where my nick (th3j35t3r) is registered to myself. If you see a ‘jester’ anywhere else it’s not me."[10]

Military service

The Jester had stated that he was a former soldier and had served in Afghanistan and elsewhere.[5][7] A former defense operative claimed that The Jester was a former military contractor involved in US Special Operations Command projects.[8] On April 10, 2012, The Jester gave a live chat interview to a class of Computer Science students at the University of Southern Maine where he confirmed his military service and stated he served four "operational tours".[11]

XerXeS and other tools

The Jester claims to have originally developed his DoS script as a means to test and harden servers.[12] After learning from an article that Jihadists were using the Internet to recruit and coordinate terror cells, The Jester resolved to disrupt online communications between Jihadists.[13] He weaponized his script and created a front-end known as "XerXeS"[14] in order to solve the script's usability problems.[12]

Hacking history

On January 1, 2010, The Jester began a campaign against Jihadist websites. His first target was alemarah.info, which was the Taliban's website at the time.[15][16][17]

On November 28, 2010, The Jester posted several tweets claiming to be responsible for the downtime WikiLeaks was experiencing.[6] He justified his alleged attacks by claiming that WikiLeaks was "attempting to endanger the lives of our [US] troops, 'other assets' & foreign relations."[5] In retaliation to The Jester's reported efforts, hacktivists including a group named Anonymous in support of WikiLeaks were reported as temporarily disrupting the website of MasterCard as well as attacking websites of Amazon and PayPal.[18]

On November 29, 2010, someone claiming to be The Jester stated that he had been raided by the U.S. and attempted to solicit money for legal fees. The Jester purported that the person was an impostor, though writers at InfoSecIsland believe the hoax was created by The Jester himself.[19][20]

On December 28, 2010, a DoS attack targeted 4chan.org. On that same day, The Jester tweeted "4chan.org — that looks like a TANGO DOWN (not) maybe you guys pissed off the wrong person trying to (wrongly) ID me?"[6] This tweet is believed to be a reference to claims by 4chan users that The Jester was a man from Montana.[6][21]

On February 21, 2011, The Jester began a DoS attack on several sites belonging to the Westboro Baptist Church for celebrating the death of homosexual U.S. service men.[22]

In March 2011, The Jester employed a different style of attack by using an XSS vulnerability to make it appear as if fabricated articles were inserted online Libyan newspapers The Malta Independent Online and the Tripoli Post. On March 28, 2011 he tweeted links to the forged articles. The articles were not visible in search, or to viewers of those websites, and viewable only via the inserted links. These tweets drew the attention of Anthony M. Freed, who examined the articles and discovered they were anomalies not contained in the newspapers' respective archives.[23] Further inspection by Freed revealed The Jester left a watermark of his signature Harlequin avatar on the articles he created, which can only be seen by tilting the computer monitor back at an angle. The fabricated articles reported degradation in troop morale among fighters loyal to Muammar Gaddafi and incidents of his soldiers abandoning their posts. Freed concluded The Jester's objective was a "psyops campaign aimed at breaking the spirit of the troops loyal to Libyan strongman Muammar Gaddafi."[23] The Jester confirmed this in a subsequent interview later the same year.[24]

In June 2011 The Jester vowed to find and expose members of LulzSec.[25] He attempted to obtain and publish personally identifiable information of key members within group, whom he described as "childish".[26] On June 24, 2011, he claimed to have revealed the identity of LulzSec leader Sabu as Xavier Kaotico, an information technology consultant possibly from New York City.[27] In July of the same year he falsely accused Hugo Carvalho, a Portuguese IT professional, of also being Sabu, leaving The Jester's outing claims to be considered suspect.[28] However, in a post on his blog in November 2011, The Jester retracted his prior identifications for "Sabu", issued an apology and correctly identified "Sabu" as Hector Xavier Monsegur, 28, of New York.[29] Sabu's identity was confirmed on March 6, 2012 when Monsegur was arrested by the FBI and it was revealed that he had been acting as an FBI informant in the interim.[30][31]

In October 2011, at the Hackers Halted USA conference, The Jester gave a surprise live presentation and fielded questions through an online chat with presenter Jeff Bardin.[24] His identity was authenticated via his Twitter account. Jester answered questions about XerXeS and other tools in development, and discussed his motivations for attacking militant jihadi recruiting websites. On August 26, 2012, Bardin hosted a similar presentation at Utica College for the college's Cybersecurity Master's program.[32]

Late November 2011, th3j35t3r claimed to take down multiple jihadist sites permanently, with his newest tool known as 'Saladin'.[33][34][35] Saladin is claimed to be similar to other 'Apache Killer' tools used by hackers. Critics have claimed Saladin does not exist, and that he is relying on domain expiration.[36]

On May 14, 2012 The Jester's Twitter account (@th3j35t3r) appeared to have been deleted, along with all posts on his WordPress blog.[37] However, the Twitter account and WordPress blog were merely temporarily deactivated and were subsequently restored May 16, 2012.[38]

On July 2, 2013, the Jester took responsibility for a series of DoS cyberattacks against the Ecuadorean stock exchange and the country's tourism website, and promised to attack any other governments considering granting asylum to NSA leaker Edward Snowden. In a June blog post, he wrote that Snowden "is not a goddam hero, here to save Americans from 'the government' because of privacy infringements and breaches of the 4th amendment, he is a traitor and has jeopardized all our lives." In tweets, the Jester also alluded to a plan to seize control of the fire alarms at the Ecuadorean embassy in London, which would force WikiLeaks founder Julian Assange to set foot on U.K. soil and face potential extradition to Sweden to face sexual assault charges.[39]

The SANS Report: The Jester: A Lesson in Asymmetric Warfare

In December 2011, Major TJ O'Connor, Army Officer, GSE, OSCP, OSWP, C|EH, a research analyst in the Information Technology and Operations Center (ITOC),[40] produced a comprehensive report for the SANS Institute detailing the history of The Jester's hacking campaigns titled "The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare".[41] The paper examines the history, motives and impact of two years worth of The Jester's hacking, and provides a detailed analysis of the timeline of his attacks, a speculative analysis of the tools he may use, and review of his use of social media and public relations through his blog.

QR code attack

On March 5, 2012 The Jester changed his Twitter account @th3j35t3r avatar from his signature Jester icon to a QR Code without comment or explanation.[42] QR Codes are bar codes that can be scanned by mobile phones and are most often used in advertising. Scanning a QR Code redirects a browser to a website.[43] Scanning The Jester's icon led to a URL where he had an image of his signature Jester icon and an embedded, hidden code that allegedly exploited a vulnerability that affects Safari, Chrome and Android browsers.[42] "When anyone scanned the original QR code using an iPhone or Android device, their device would silently make a TCP shell connection back to my remote server," The Jester wrote. "Like a phone call, if you like."[42][44]

Apparently, once connected to the Jester's server, the network diagnostic tool Netcat checked the connecting mobile device to see if it had Twitter software installed.[42] Twitter account information was then harvested and checked against a list that The Jester allegedly maintains of known Twitter accounts associated with the hacking groups Anonymous, LulzSec or AntiSec, with Wikileaks, Al Qaeda and Islamic Jihadi recruiting sites.[42] Twitter accounts that did not hit a match to the list were ignored. Possibly, when a Twitter account registered a hit on the list, the account permissions were transferred to The Jester, he elevated his permissions to allow him to exploit the entire mobile device. It is possible that in this manner The Jester was able to obtain access to SMS text messages, voicemail, call logs, and email on the phone.[44][45]

The Jester's QR code ran quietly for five days before a Twitter user going by the moniker @RootDial noticed the embedded code and mentioned it.[42] In those five days, The Jester wrote "Over 1,200 curious netizens scanned the QR code . . . Of those, over 500 devices reverse-shelled back to the listening server. Of those, a significant number were on the '[hit]-list' and as such treated as valid targets."[42][46]

On March 12, The Jester posted an encrypted file containing the data harvested from his QR Code.[44] In a private communication, SecurityNewsDaily asked The Jester why he'd encrypted the information rather than post it in regular, plain text. "I encrypt my [data] dumps as a matter of course because I am not the same as my detractors who drop personal info all the time," he replied. "The right people have the plain text dump. It would be highly irresponsible of me to be dropping anything in the open."[44]

References

  1. Keizer, Gregg (2010-11-30). "WikiLeaks moves to Amazon servers after DOS attacks". Computerworld New Zealand. Retrieved 2010-12-29. 
  2. "Hacktivist Tactics Raise Ethical Questions". Infosecisland.com. 2010-01-27. Retrieved 2011-08-30. 
  3. th3j35t3r (2010-07-03). [Interview] The Jester. Interview with ethicalhack3r. ethicalhack3r. http://www.ethicalhack3r.co.uk/security/interview-the-jester/. Retrieved 2010-12-29.
  4. 4.0 4.1 th3j35t3r. "About Jester". Retrieved 2010-12-29. 
  5. 5.0 5.1 5.2 5.3 5.4 Anthony M., Freed (November 29, 2010). "The Jester Hits WikiLeaks Site With XerXeS DoS Attack". Infosec Island. 
  6. 6.0 6.1 6.2 6.3 6.4 Nelson, Steven (2010-12-28). "Patriotic ‘hackitivist for good’ may be behind takedown of 4chan.org". The Daily Caller. Retrieved 2010-12-29. 
  7. 7.0 7.1 Rosenbach, Marcel; Stark, Holger (2010-12-07). "Julian Assange Becomes US's Public Enemy No. 1". Der Spiegel. Retrieved 2011-12-02. 
  8. 8.0 8.1 Vance, Ashlee (2010-12-03). "WikiLeaks Struggles to Stay Online After Attacks". The New York Times. Retrieved 2010-12-29. 
  9. th3j35t3r. "Maybe I might setup a blog here??". Retrieved 2012-06-07. 
  10. th3j35t3r. "IRC Channel". Retrieved 2012-06-07. 
  11. "Transcript: Patriot Hacker th3j35t3r Addresses USM Students". Infosec Island. 2011-04-11. Retrieved 2012-05-28. 
  12. 12.0 12.1 Freed, Anthony M. (2010-02-10). "Jester Unveils XerXeS Automated DoS Attack". Infosec Island. Retrieved 2011-01-03. 
  13. Freed, Anthony M. (2010-02-04). "More Talks with Anti-Jihadi Hacker The Jester". Infosec Island. Retrieved 2011-01-03. 
  14. Bailey, Laurelai (2010-07-08). "XerXeS source code". SecLists.Org Security Mailing List. Retrieved 2011-07-08. 
  15. th3j35t3r (2010-06-30). Hacker macht Jagd auf Online-Dschihadisten. Interview with Florian Flade. Die Welt. http://www.welt.de/politik/article8236634/Hacker-macht-Jagd-auf-Online-Dschihadisten.html. Retrieved 2010-12-29.
  16. th3j35t3r (2010-06-30). Unredacted Original Interview with Newspaper ‘Die Welt’. Interview with Florian Flade. th3j35t3r.wordpress.com. http://th3j35t3r.wordpress.com/2010/06/30/unredacted-original-interview-with-die-welt-english/. Retrieved 2010-12-29.
  17. "Afghan Taliban deny meeting U.N. envoy". Reuters. 2010-01-30. Retrieved 2011-01-03. 
  18. David Leigh, Luke Harding WikiLeaks cyber attacks: a tango with the Jester The Guardian, 2 February 2011
  19. "Did WikiLeaks Hacker The Jester Pull Police Raid Hoax?". Infosecisland.com. 2010-12-02. Retrieved 2011-08-30. 
  20. Sullivan, Bob (2010-12-07). "Red Tape - WikiLeaks hacker a villain or a hero?". Redtape.msnbc.msn.com. Retrieved 2011-08-30. 
  21. Prefect (2010-12-10). "Anonymous Turns Operation Payback Toward "The Jester"". Praetorian Prefect. Retrieved 2011-01-02. 
  22. (2011-03-24) "Hacktivist Maintains Attack on Westboro Baptist Church" Retrieved 28 March 2011
  23. 23.0 23.1 Freed, Anthony (2011-03-30). "Patriot Hacker The Jester's Libyan Psyops Campaign". Infosec Island. Retrieved 2011-12-01. 
  24. 24.0 24.1 "Hacktivist "The Jester" Draws Crowd at Hacker Halted". Infosec Island. 2011-10-31. Retrieved 2011-11-23. 
  25. Poeter, Damon (24 June 2011). "Will LulzSec's Hit on Arizona Cops be its Last Hurrah?". PC Magazine. Ziff Davis. Archived from the original on 25 June 2011. Retrieved 25 June 2011. 
  26. Halliday, Josh (24 June 2011). "LulzSec: the members and the enemies". The Guardian (London). Guardian Media Group. Archived from the original on 25 June 2011. Retrieved 25 June 2011. 
  27. Chapman, Stephen (24 June 2011). "LulzSec's leader, Sabu, revealed?". ZDNet. CBS Interactive. Archived from the original on 25 June 2011. Retrieved 25 June 2011. 
  28. "The Quest to Unmask the Ringleader of Anonymous - Technology". The Atlantic Wire. 2011-07-14. Retrieved 2011-08-30. 
  29. Wagenseil, Paul (8 March 2012). "Despite Being Anonymous, Hacktivist Sabu Wasn't Hard to Find". Security News Daily. Retrieved 13 March 2012. 
  30. "5 'Anonymous' hackers busted after one becomes FBI informant". Newsday. AP. March 6, 2012. 
  31. Goldman, David (March 6, 2012). "Anonymous in disarray after major crackdown snares leaders". CNN. 
  32. "th3j35t3r: BIG shout-out to Mr H.Cooper". Twitter. Retrieved 2012-09-01. 
  33. ʇuıɐs ʞɔopuooq™ (November 27, 2011). "jihadunspun.com - TANGO DOWN - PERMANENTLY (yes forever)". Twitter. 
  34. ʇuıɐs ʞɔopuooq™ (November 27, 2011). "muslimdefenseforce.islamicink.com - TANGO DOWN - PERMANENTLY". Twitter. 
  35. ʇuıɐs ʞɔopuooq™ (November 27, 2011). "falojaa.net - TANGO DOWN - PERMANENTLY". Twitter. 
  36. "th3j35t3r’s Saladin Tool Exposed". Twitter. Retrieved 2013-07-02. 
  37. ""Patriotic hacktivist" The Jester unmasked—or maybe it's a big troll". Ars Technica. May 15, 2012. 
  38. th3j35t3r. "Not totally sure what just happened, but damn it's getting out of hand now". Retrieved 2012-05-28. 
  39. Snowden and Assange Targeted by Mysterious Hacker "The Jester", Mother Jones, 2 July 2013
  40. "Department of Electrical Engineering and Computer Science - Home". Eecs.usma.edu. Retrieved 2012-07-09. 
  41. O'Connor, TJ. "The Jester Dynamic: A Lesson in Asymmetric Unmanaged Cyber Warfare" (PDF). SANS Institute InfoSec Reading Room. 
  42. 42.0 42.1 42.2 42.3 42.4 42.5 42.6 Wagenseil, Paul (March 13, 2012). "Anti-Anonymous hacker threatens to expose them". MSNBC. 
  43. "What Is A QR Code And Why Do You Need One?". Search Engine Land. October 15, 2009. 
  44. 44.0 44.1 44.2 44.3 Wagenseil, Paul (March 12, 2012). "Pro-American Hacker's Attack Threatens to Expose Anonymous". Security News Daily. 
  45. Ullrich, Johannes (March 11, 2012). "An Analysis of Jester's QR Code Attack. (Guest Diary)". ISC Diary. 
  46. Curiosity pwned the cat th3j35t3r.wordpress.com

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.