PROTIP: Press 'i' to view the image gallery, 'v' to view the video gallery, or 'r' to view a random entry.
This submission is currently being researched & evaluated!
You can help confirm this entry by contributing facts, media, and other evidence of notability and mutation.
On April 11th, 2013, the hacking news blog CyberWarZone reported that “Mauritania Attacker,” one of the organizers behind Operation Israel, was planning a similar campaign to infiltrate American websites and servers in retaliation for the deaths of innocents in Iraq, Afghanistan, Gaza and Pakistan, citing a Pastebin file dubbed “OpUSA” which suggested that the attack will take place on May 7th, 2013.
On April 14th, Tunisian Anonymous collaborators uploaded a YouTube video titled “#OPusa 7/5/2013,” featuring a speech by a United States soldier criticizing the Israeli occupation of Palestine (shown below, left). On April 21st, another Pastebin document was released by the Anonymous-affiliated group “N4m3le55 cr3w,” which warned United States President Barack Obama and American citizens of the impending OpUSA attacks. On April 22nd, YouTuber kiluminati544 uploaded a video titled “#OpUSA Anonymous hackers send message to Obama” (shown below, right), incorporating the N4m3le55 cr3w’s statement in text-to-speech voiceover.
On April 24th, a Pastebin page was created containing a target list of United States government and banking websites to be attacked during OpUSA. On May 2nd, the hacking blog Illsecure announced that 10,000 credit cards belonging to American sites had been leaked by the OpUSA hacker group “AnonGhost.” On the same day, the security blog Krebs Security posted about a leaked confidential alert by the United States Department of Homeland Security (DHS), which warned that the OpUSA attacks would likely “result in limited disruptions and mostly consist of nuisance-level attacks.” On May 6th, The Huffington Post published an article about the impending OpUSA attacks, noting that many previous operations had been considered failures.
On May 7th, the website Hacker News Bulletin posted a list of websites and email accounts that had been compromised by OpUSA hacktivists. The same day, the website BankInfoSecurity published an article reporting that no federal government websites had been compromised or threatened during the course of the day, adding that the the Izz ad-Din al-Qassam Cyber Fighters’ refusal to join the operation likely defused the attack. The article also quoted University of Alabama at Birmingham researcher Gary Warner, who noted several lackluster successes in the operation:
Gary Warner: “[They’ve] had a couple moderately interesting successes, such as adding a host to Microsoft’s Republic of the Congo domain name and the very short-lived defacement of a small bank in Arkansas. The group also appears to have mistakenly targeted a blood-bank site, which a non-English-speaking hacker apparently thought was Bank of America.”
Also on May 7th, The Daily Dot published an article listing several small websites compromised by OpUSA hackers, including an “out-of-commission parenting site,” an online bakery and a German real-estate site.
There are no videos currently available.