Who Hacked Mahamevnawa? Who Are The Algerian DZ Hackers? All Explained

If you don’t know already, the popular Buddhist website Mahamevnawa (Mahamevnawa.lk) was hacked and defaced by a group of Algerian Hackers calling themselves H4ck Dz Team. You can read the gossip9 article about the hack here (unfortunately I couldn’t find an English version of the news)

Because, this is an attack against an innocent but popular website in Sri Lanka we decided to look in to it to see who these people are. If you don’t know who these people are just Google the term “H4ck Dz Team”and you will see the hacks and the defacements they’ve done in the past.

So I’m going to tell you what I found,

I went through the comments of the Gossip9 article, on the comments someone has found and posted a link to “H4ck Dz Team” hackers’ Facebook page : https://www.facebook.com/H4ck.Dz.Team

Then looking at the search results of the “H4ck Dz Team” and going through the defacements you can see that he used to call himself “nO lov3” as well as “H4ck Dz Team”. And in some of the defacements there is an email address for contacting “H4ck Dz Team” : nolove49@gmail.com.

If you look at Facebook the email address nolove49@gmail.com is used to register a Facebook profile : https://www.facebook.com/soufain.dz.

But obviously this can’t be a real profile. So I looked on and found some few things which I won’t say what right now, but then I came to a dead end.

So I showed what I found to my good friend which I call him “V”, and he somehow found and gave me the website of H4ck Dz Team” : http://dz-team.biz.

DZ-Team.biz is a hacking forum that is being run by H4ck Dz Team“, looking at the whois info of dz-tam.biz won’t give that much info. But if you reverse ip the dz-team.biz you can see that only 7 websites are hosted on the ip that has dz-team.biz : http://www.ewhois.com/dz-team.biz/

They are,

dz-team.biz
al-daa.com
dz-mafia.net
atddz.com
rahahbb.com
mahdiadz.com
2algeria.org

dz-team.biz and dz-mafia.net belongs to the H4ck Dz Team Hackers. But because so little amount of websites are hosted at this IP and all of these websites being Algerian there is a stong possibility that all these websites are hosted under the same account.

Now, because the hackers that we are looking for are Algerian I first checked the 2algeria.org website. The website uses Adsense and Google Analytics. The same Google Analytics ID and Adsence ID is being used on 3 websites. Which means the 3 websites use the same Google account for Google Analytics and Google Adsence.

There can be more websites using the same Google Analytics and Google Adsence ID.

The Google Analytics ID is : UA-3582164
The Google Adsence ID is : pub-7586127814300842

The 3 websites using the same Analytics and Adsence IDs are :

2algeria.com
2algeria.org
DZWORLD.INFO

The same person who owns the DZWORLD.INFO also owns DZWORLD.NET and DZWORLD.ORG. So many DZs repeating over and over again and belonging to the same person, is this a coincidence?

Because DZWORLD.INFO and 2Algeria.org uses same Google account for Analytics, they should belong to the same person although their whois information are different.

So if you look at the 2Algeria.org who is info it looks like this,

So khadir ben youcef owns DZWORLD.ORG, DZWORLD.NET and DZWORLD.INFO. If you look at the websites that are hosted at the ip of dz-team.biz all the websites other than dz-team.biz and dz-mafia.net are registered under the same name khadir ben youcef or has some connection to that name.

Looking at the email you will find so many domains registered under the name and the email : khadir ben youcef ,khadir_khadda@hotmail.com.

I found nearly 20 domains registered under the same name and email, there can be more.

The email : khadir_khadda@hotmail.com is used to register the https://www.facebook.com/benyoucef.khadir

Googling khadir ben youcef you will find this Facebook profile : https://www.facebook.com/khadda

The email khadir_khadda@hotmail.com, which is used to register all the domains appear in his contact information of that Facebook profile (https://www.facebook.com/khadda) , and khadir ben youcef also lives in Algeria the same country where DZ Hackers are from.

Looking at the LinkedIn profile of khadir ben youcef you can see that his occupation is Information Technology and Services so he has the technical knowledge to do such hacking.

So looking at all these things we can come to a conclusion that khadir ben youcef is Hack DZ team member of n0 l0ve hacker, and according to @ipv10, this https://www.facebook.com/khadda is also a fake profile and the real people behind it are the so called “brothers” of the https://www.facebook.com/khadda Facebook profile, which is also a possibility because there are no photos of that person in real life.

So the final conclusion

So the final conclusion is that H4ck Dz Team consist of,

Ben Youcef Khadir aka khadir ben youcef

Facebook : https://www.facebook.com/khadda
Twitter : @dzworld
Gmail : khadirbenyoucef@gmail.com
Skype : khadir_khadda
Live mail : khadir_khadda@hotmail.com

Yakoub Khadir

 

 

 

 

 

 

 

 

Facebook : https://www.facebook.com/yakoub.khadir
Google Plus : https://plus.google.com/104249732338023001842/about

On his Facebook profile and Google + profile he lists 2algeria.org as his website. Which is registered under the name of khadir ben youcef.

Khadir Kamel

 

 

 

 

 

 

Facebook : https://www.facebook.com/CaPiTaiNeDz
Twitter : twitter.com/CaPiTaiNeDz

In his Facebook profile cover picture says his website is dziso.com,  that website too is registered under the name of Ben Youcef Khadir aka khadir ben youcef.

 

 

 

 

 

 

 

 

And also in his Facebook profile it says that his email is khadirdz@gmail.com however the Facebook profile that is registered under that email is a female profile called “Jojo Imily” (https://www.facebook.com/profile.php?id=100002768720690)

I think nearly 100 domain names (both active and inactive) are shared between these 3 and registered under different email address. A typical thing for hackers who use stolen credit card information to register domains on the internet.

Some of the emails that they’ve used to register domain names include,

elchoroukhost.net@gmail.com
cyberbellia@gmail.com
algerie@hotmail.com.tr

Things To Be Expected On Facebook.

Facebook is in a period of change where, where they are going to add new features and the highly expected app center.

Today when I logged in to Facebook, I found this unusual icon in the side bar called “Connection Search”, it’s actually a way of finding friends like “Contact search”, so when I clicked on the Connection search icon this page appeared. Click to see the large image.

Facebook connection search, a thing to expect?

So is this a something to expect on Facebook? I asked some of my friends and no one has ever seen something called “Connection Search” before.Sadly the feature is still not available for me.

The other interesting thing here is the Tweet button. I think this is the first time, we’ve seen an actual Tweet button on a main Facebook page.

Facebook is also about to roll something new features called “Trending Videos”, where they are going to put popular public videos on Facebook. Just like what’s hot on Google Plus.

I’ll put a screen cap, when I see “Trending Videos” on my timeline.

The Facebook App Center will look like this :

Facebook AppCenter

#SMDayCMB The Hashtag That Made Me Lugh Hard.

If you don’t know (like I didn’t know until 5 P.M yesterday, when a friend of mine asked me whether I was at the Mashable Social Media Day), there was something called Mashable Social Media Day at Excel World, Colombo. I don’t know what happened, whatever happened I guess it’s about social media.

And the hash tag for the event was #SMDayCMB, and when I logged into Twitter at 11 PM and checked some of the tweets, they were like this :

http://twitter.com/arvindjkv/status/219106547308036096

http://twitter.com/namila007/status/219103015066537984

And I was thinking this,

http://twitter.com/RukshanR/status/219121987862278144

http://twitter.com/ipv10/status/219123263199117313

If you don’t know Twitter started rolling a feature called Tailored Tweets, where trends are made according to your location, the websites you frequently visit and the tweets you make.

And it didn’t appear tonight, it was rolled 2 3 weeks back by Twitter.

There are no such thing as word wide trends, you can get the world-wide trends if you opt out from tailored trends.

I think the best thing for all the people to do is to know more about what’s happening in social media, rather than “troll” in for a social media day. Thanks for making us (me and @ivp10) laugh hard. I’m so rude.

PS : At least please read More Mashable, before going to their events.

http://twitter.com/RukshanR/status/219132370710827009

How Facebook Likejacking Can Be Used To Trigger Malicious Scripts.

Facebook Like Jacking is another method of click jacking, where a user clicks a hidden like button that will share a link with the user’s friends without the user’s knowledge.

Although Facebook has reduced the Like jacking incidents, recently there was rise of likejacking scams.Therefor I decided to write a post explaining the mechanisms how these likejacking scams work. I’ve written a post about the malicious Facebook browser extensions that can be found in my old blog.

I’m not going to talk about what is clickjacking and likejacking, I’m going to show the mechanism of how likejacking works and how it can be used to trigger a malicious script once the Like button is clicked.

So a typical clickjacking scam page are most of the time designed to looks like YouTube, Facebook page or video frame to trick the user in thinking it’s a legitimate website, well it can come in any form. The bottom line is the website is designed to trick the users.

So I went to the clickjacking website that’s there in the Naked Security blogpost, and saved it’s code. You can find the HTML code of the website here : http://nopaste.me/paste/14304159654fdd8bd82d01c

Basically it’s a simple website that’s made to look like a video frame, it’s a pretty simple HTML code with some javascripts. If you start looking from the code from the top, the first thing you should see is the meta tags.


<meta property="og:title" content="[VIDEO] Snake Eats MAN!"/>
<meta property="og:site_name" content="[VIDEO] Snake Eats MAN" />
<meta property="og:image" content="http://s15.postimage.org/5ybac4awr/snake_eats_man.jpg" />
<meta property="og:description" content="CAUGHT ON TAPE- A Giant Snake Swallows Up A Zookeeper in Front of Hundreds of People!" />
<meta property="og:type" content="website" />
<meta property="fb:admins" content="38305883" />

These meta tags allow a malicsious attacker to change the picture, title, message of the post that’s being posted on the Facebook time line irrespective of the contents of the website.

Then comes the Like button code, it’s a bit different in this webpage. Usually it’s the same Like button code. Click to see the large image.

However there is a small modification to this code, the like button is hidden with the small CSS trick, so the user won’t know that he’s clicking a like button.


div.transbox
  {
  opacity:0;
  filter:alpha(opacity=0); /* For IE8 and earlier */
  }

So the hidden Like button iframe code will look like this, click to see the large image.

In this website, it’s used like this, click to see the large image.

With the help of some more CSS trick the hidden Like button can be placed near a fake play button image, so that when the play button is clicked, the user will click the hidden Like button and without knowing the user will share the post in his timeline.

Up to here it’s pretty much simple stuff, however there is a small function called “FB.Event.subscribe” let’s a malicious user to trigger an event can be used to trigger a malicious script once the like button is clicked. Most scammers use this to load a survey that will give scammers money. However, this can also be used to trigger a malicious javascript once the Like button is clicked, even if the Like  button is not hidden.

In the following likejacking scam it’s used like this,

<script charset="utf-8" type="text/javascript">
FB.Event.subscribe('edge.create', function(response) {
        window.location = window.money_page;
});
</script>

However, a malicious attacker can modify the script to look like this, this will load a malicious javascript once the like button is clicked. So the victim will not suspect.

<script charset="utf-8" type="text/javascript">
FB.Event.subscribe('edge.create', function(response) {
 //EVIL SCRIPT HERE
 //REDIRECT PAGE
 //MALWARE DOWNLOAD
});
</script>

Why People Need To Stay Away From Cyber-Vigilantes.

Yesterday I came across this post “We don’t need cyber-vigilante justice“, which is must read for people who want to become hackers or cyber-vigilantes and why people shouldn’t be like that. Being a cyber vigilante to show that you are a l33t hacker is one not good idea, but joining and making partnerships with equally not a food idea.

One way or another, all these cyber vigilantes are criminals, just like our ordinary day-to-day criminals but these people live online. However the unfortunate thing is these vigilantes gather followers, and these followers try to make their own way towards e-fame either by hacking of helping these vigilantes of their work. I guess it’s not like a gang but like a cult.

Anonymous has their own set of followers, LulzSec had their own followers, Jester has his own set of loyal fans. May be these vigilantes like this e-fame, anyway most of these followers are ordinary hackers or, just another scrip kiddies. When they follow these vigilantes and try to show they are also l33t, the end result is them making more havoc by hacking  websites, disrupting services and posting personal information on the internet and in the end getting caught.

If you look at Anonymous, they grew up to a point where Anonymous became a cancer to the internet, some of these Anonymous were elite hackers hacking big websites. Anonymous became famous and later Anonymous gathered followers that were no more than script kiddies that started hacking, defacing every small website that comes in their way.

Finally what happened is that most of the top members of the Anonymous got arrested and, most of the followers inevitably got arrested or either got their personal information exposed or posted on the internet. Even we had our own AnonymousLK and we had the utmost pleasure of exposing them.

It’s not just Anonymous and LulzSec, even people who are supporting the so-called “patriotic” hacker Jester has also suffered when their personal information published on the internet, and recently the websites that Jester supports like the Wounded Warrior Project was also brought down, and personal information of LeRes was published online by the UGNazi hackers who are against Jester.

The best thing is not to take sides, not to support people like Anonymous, and people like Jester who is “hacktivist for good”. There is no such thing as hacktivist for good. It’s illegal and there is no difference between Anonymous type hackers. Helping cyber vigilantes is same as helping everyday crooks, you never know when you’ll get in to trouble thanks to them.

So people need to think twice about becoming online vigilantes or taking their sides. Not only the people who are being targeted by the vigilantes are affected, but also people who take sides are also affected in the cat fights between hacktivists. Stay safe.

“The law of celestial mechanics dictate that when two objects collide there is always damage of a collateral nature”

AnonymousLK, Case Closed?

If you were reading the series of posts about AnonymousLK, we said that AnonymousLK is comprised of 4 hackers.

However we never posted any info about TX and Zer0 Thunder, therefore I think it’s good to add a short note about why we never posted information about these two.

After making the posts about HackerzMafia and ZonTa, @ipv10 went on to the IRC channel of AnonymousLK few weeks ago (irc.evilzone.org #srilankanz), where she talked with TX who once threatened us commenting on this blog.

By that time we’ve found almost all the information about TX and Zer0 Thunder and it was about whether we should post them or not. @ipv10 told TX what we’ve found about him and he admitted that it is him and he kindly asked not to post about him.

Because he was kind enough to admit his identity and told about his story and given us references to confirm his identity we decided not to post about him.

Same can be said about Zer0 Thunder, although he wasn’t ready to accept his identity. Finding Zer0 Thunder was the best part, it was hard to find loose ends. until we found out that we can get an email from hackimpact.com the website that Sameera (HackerzMafia) and Shalika (ZonTa) and Zer0 Thunder created, the email has the name of Zer0 Thunder in it.

Any one can get this email address by registering at hackimpact.com which is now hidden from the website and from Google by robot.txt.

UPDATE :

I just found this status from AnonymousLK today. The image shows them say that they have set up their IRC channel at irc.evilzone.org at #srilankanz.

If you look at the date you can see that the Tweet was made in August 22, 2011. And if you look at the date that AnonymousLK joined Twitter it’s August 19, 2011. So this further proves us right that the IRC channel was indeed used by AnonymousLK from the beginning.

We expected you, nothing happened.

The End?

Staying Frosty On Facebook.

We say we’re living in a digital world and how people are connected through the internet more than ever. However, when it comes to using social networking most people are still very primitive. The latest addition to this came yesterday when a teacher was blackmailed on Facebook into sex by the suspect who befriended her on Facebook (News Here).

I think the reason for people to act differently online than in real life is a very complex one, social networking has only been here for like 10 years and most people on Facebook have been there since 2008 or later so most probably they’ve been social networking for only 4 years or less. It’s a new thing for all human beings and people have failed to understand the differences and similarities in real life and life online.

  • What makes people not to share their photos with everyone in real life while sharing them with everyone in the world on Facebook?
  • What makes people not be friendly and talk with strangers in real life while people accept every friend request on Facebook without even knowing that person exist in real life?and believe what they say.
  • What makes people not to share their private information in real life while they share everything what comes to their mind on Twitter?
Some good comments on the article “Teacher blackmailed into sex on Facebook” : 

I think people, specially children needed to be taught how to be safe on social networking and internet safety practices before they starting to use internet as we do with other things in real life. However, the fascinating thing is because internet and social networking has been there for a very short time it’s a new thing even for parents, and parents themselves don’t know how to be safe when it comes to being online.

I think I was lucky in that way because I started learning about computers and internet when I was 10 (I didn’t have my own computer, I got my first when I was 12) and I read the news and stories about how people got into trouble thanks to the internet. And when I got my own internet connection in 2010 when I was 20, I know how to protect myself on the internet and for me so far so good.

Being blackmailed into sex on Facebook is not the only thing that can happen to a person, there is an increasing trend where beautiful photos of girls are being posted on popular forums and sometimes even on porn forums, which can affect you for the rest of your life. These photos are then being used by other people in making fake profiles under fake names.

It’s amazingly simple for a fake profile on Facebook to get information from someone that they normally don’t share in real life, from mobile numbers to personal stories. Specially if you use a female profile it’s really easy to get information from both males and females alike.

This video on from Tom Ryan shows how easily how got access to military classifid information by using a fake profile called Robin Sage  : Tom Ryan | Palantir Technologies

There is another danger that you don’t understand in adding unknown people on Facebook. You can hack ANY, YES ANY Facebook account, if you can add 3 profiles in to your target profile. I won’t going to reveal the process, but trust me it’s very simple to hack any Facebook profile if you can slip 3 friends.

How to stay safe : 

  • Try to stay anonymous as possible, don’t even give your real date of birth to Facebook, Facebook only need it to confirm you are above the age to have a Facebook account.
  • Don’t add unknown people on Facebook, if you do make sure they don’t see personal stuff you post on Facebook.
  • Always use two factor authentication, so it’ll make your Facebook account almost always bullet proof. You can activate two factor authentication from the security settings on Facebook.
  • Don’t post any photos of you on Facebook, and it’s better to not to let others take photos of you if they are going to post them on Facebook.
  • And importantly learn how to be safe online before you jump into it.

Flame, Another Weapon of Industrial Cyber Warfare.

My Twitter Timeline is full news about the discovery of the malware called Flame, which was found mainly in Iran and some other middle east countries. This is also another malware targeting particular countries and used for espionage which has some unique features that separates it from other malware like Stuxnet, and Duqu and some features that resembles them.

  • It is a backdoor virus, a trojan virus and also a worm combined, it spreads mainly via USB devices and through networks.
  • It has a complete malware, it can record audio from the mic of the computer, take screenshots and also log key presses and send them to the command and control center. Although there have been malware with such features this is the first  malware to have all these features.
  • Flame malware is large which is 20mb, where most of the malware that are found these days are mostly smaller in size.
  • The malware is highly complex, it has multiple compression and encryption methods to be used for the data sending to the command and control servers.

According to researchers it has some features common to Stuxnet, which targeted nuclear power plants of Iran, Flame is also used for industrial espionage and use the same vulnerability in Windows to infect. This is another example for cyber attacks targeting governments and high-profile targets of countries.

It’s not hard for one to imagine that an average person or a group, because :

  • An average coder or a group can’t create malware with such complexity. It requires a group of highly talented group of people specialized in designing such malware which only very few countries in the world possess.
  • An average person or a group has no need of such a malware to spy on Iran and other Middle Eastern countries other than another country who are keen to keep an eye on Middle East, and only few countries have talent to build such a malware, like US, Israel or China who are famous for its hacking capabilities.

As this article from Reuters points out,

It is the most complex piece of malicious software discovered to date, said Kaspersky Lab security senior researcher Roel Schouwenberg, whose company discovered the virus. The results of the Lab’s work were made available on Monday.

According to Kaspersky the Flame malware has gone undetected for five years which is a pretty long time and if someone or a country can build such a tool five years ago. One can imagine how complex these industrial malware have evolved now, and the tech skills of the builders of Flame could have achived by now.

This also makes a question that how many unknown cyber operations are currently out there happening around the world done by countries, and cyber capabilities of other countries. Because, malware like Duqu, Stuxnet are not malware that are not made and being used by ordinary hackers. According to my friend @ipv10 who is a web researcher herself looking at the distribution and capabilities required to build such a malware the origin of the malware should be non other than USA.

If you are skeptic about cyber warfare, it has already begun. And when other countries are moving fast in the direction of arming themselves with cyber weapons inducing India, all we are doing is hunting perverts on Facebook, time for us to move on improving out cyber capabilities.

You can read Kaspersky’s blog post of comprehensive explanation of Flame malware : http://www.securelist.com/en/blog/208193522/The_Flame_Questions_and_Answers

How China Is Spying On Your Computer.

It’s not a new thing that Chines mobile firms like ZTE and Huawei are famous for helping the Chinese government to gather intelligence from around world, helped China to engage in intellectual property theft from leading companies, and the data that were being gathered by ZTE and Huwawei devices helped in Chinese hackers in breaking into important places. It’s a known thing now that ZTE and Huwawei devices are now banned in companies in US and other foreign countries. So what’s the state in Sri Lanka?

Today morning I came across this article at Groundviews, which in their post titled Are Chinese Telecoms acting as the ears for the Sri Lankan government? point out some of the facts that most people in the country don’t know about the connection between ZTE, Huwawei and Sri Lanka. As they point out :

  • Both ZTE and Huawei have signed contracts worth tens of millions of US dollars with governments in Central Asia, not known for their democratic credentials.
  • The telecoms products (like USB dongles) and possibly even services  (including underlying network technologies and infrastructure) aid espionage.
  • Major telecom providers in Sri Lanka have multi-million dollar contracts with ZTE and Huawei.
  • In fact, the overwhelming majority of mobile broadband internet access devices sold in Sri Lanka by Mobitel, Dialog Axiata, Etisalat and Airtel are made by either ZTE or Huawei. Even I am using a Huwawei device which I bought from a Mobitel outlet.
  • In June  2011, it was reported that “Sri Lanka Telecom (SLT) has awarded a long-awaited LKR3 billion (USD 27 million) fibre-optic network rollout contract to China’s ZTE Corp as part of the national ‘i-Sri Lanka’ project”.
  • Mobitel signed an agreement (May 2011) with the country’s Board of Investment for equipment import duty exemption on its LTE network deployment in partnership with another Chinese vendor, ZTE.
  • Huawei maintains a 33% sector share of existing infrastructure maintenance.
This classified cable from the US embassy that was released on Wikileaks show how ZTE and Huwawei are expanding in Sri Lanka : http://www.cablegatesearch.net/cable.php?id=09COLOMBO1095

Chinese firms continue to make inroads into the Sri Lankan market, including into areas such as telecommunications infrastructure.  The Sri Lankan telecommunications market has expanded rapidly, and telephone companies plan to expand into the newly freed conflict areas of the North and East.  Huawei Telecommunications, a Chinese owned corporation, has worked diligently to corner the telecommunications infrastructure market in Sri Lanka.

Huawei maintains a 33% sector share of existing infrastructure maintenance.  Alcatel-Lucent and Ericcson are the two other major competitors, and each has a 33% sector share of existing infrastructure maintenance.  Another Chinese company ZTE has a tiny 2% marker share.  Huawei Sri Lanka is expanding aggressively into the new infrastructure market in the North and East, where they own more then 75% market share.  Alcatel-Lucent and Ericcson are not major players in the new infrastructure market, and they seem disinterested in increasing their market share.

Yes, it’s acceptable that because we don’t make our own devices like USA, we don’t have any other option other than go for the cheap Chinese products, however it’s a scary that from the device we use to access the internet and the technology in the country is provided by Chinese companies that are famous for spying and aiding Chinese government hacking attacks.
Some experts say ZTE and Huwawei is worse than Stuxnet and according to some there are direct connections between Chinese companies like ZTE and Huawei with Chinese hacking attacks on US companies like US defense contractors and US military officials.
When it’s not only the devices but the whole internet structure in the country has been built by Huawei and ZTE there’s almost no escape, they might be spying on us even this very moment. Although I don’t agree with what Groundviews say most of the time, I have to appreciate them for giving these stats that most people don’t know. If you are worried about a Chinese invasion, they are already here.

Sri Lankan ISPs Block Access To Piratebay and Pastebin.

Looks like Sri Lankan Internet Service Providers are blocking access to popular torrent tacking website The Pirate Bay (thepiratebay) and popular code sharing website pastebin.com.

The Sri Lanka Telecon has blocked access to Pastebin and The Pirate Bay for two days/ The Indian ISP AirTel has blocked access to torrent websites like The Pirate Bay and Torrents.eu for few weeks now.

It’s not sure why Sri Lanka Telecom is blocking access to patebin, however looks like not all Sri Lanka Telecom subscribers are affected, according to some pastbin is still accessible and takes a very long time for the page to come up. Pastebin is a website designed for code sharing, however now it’s widely being used by the Anonymous hackers  as a place to post their hacked data. So is Sri Lanka Telecom blocking access to pastebin because Anonymous hackers posting hacked information? There is no any other reason than that to block pastebin.

Looks like The Pirate Bay is also being blocked by Sri Lanka Telecom, the real reason for this is still unknown, there has been no press release or anything like that. Sri Lankan Telecom might be blocking Piratebay because of piracy issues, and people must not forget that Piratebay is also a place where Anonymous hackers release their hacked information.

@CrazyNalin @RukshanR @tpb TPB is banned from Airtel too. torrents . eu and some more too. Many people are having difficulties in accessing
— Madhu (@ipv10) May 20, 2012

However for non Sri Lankan Telecom subscribers pastebin and The Pirate Bay (for non AriTel subscribers) is still freely accessible.

Did Sri Lankan Telecom block patebin because of Anonymous hackers? I’ll update this post as I find more information.

However, if you know the ways it’s pretty much easy to bypass these blocks by using proxies, VPN, or my favorite TOR. Meanwhile in Pakistan Twitter has been blocked by the Pakistani Telecommunication Authority, looks like today is a sad day for freedom on the internet.