<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[defacements - Shodan Blog]]></title><description><![CDATA[The latest news and developments for Shodan.]]></description><link>https://blog.shodan.io/</link><generator>Ghost 0.7</generator><lastBuildDate>Fri, 10 Apr 2026 02:27:40 GMT</lastBuildDate><atom:link href="https://blog.shodan.io/tag/defacements/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Tracking Hacked Websites]]></title><description><![CDATA[<p>I wanted to revisit the results of a few posts last year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and <a href="https://blog.shodan.io/top-website-defacers-june-2015/">see how things have changed</a> since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the</p>]]></description><link>https://blog.shodan.io/tracking-hacked-websites-2/</link><guid isPermaLink="false">bcf05327-f9e6-40a5-add3-297280fe74b8</guid><category><![CDATA[research]]></category><category><![CDATA[defacements]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Mon, 18 Jan 2016 10:25:08 GMT</pubDate><media:content url="http://blog.shodan.io/content/images/2016/01/Blog-Hacker-Background.jpg" medium="image"/><content:encoded><![CDATA[<img src="http://blog.shodan.io/content/images/2016/01/Blog-Hacker-Background.jpg" alt="Tracking Hacked Websites"><p>I wanted to revisit the results of a few posts last year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and <a href="https://blog.shodan.io/top-website-defacers-june-2015/">see how things have changed</a> since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the data:</p>

<script type="text/javascript" src="https://asciinema.org/a/21387.js" id="asciicast-21387" async></script>

<p>Here's the Top 10 Website Defacers as of January 2016:</p>

<ol>
<li><strong>GHoST61</strong>: 51  </li>
<li><strong>Kadimoun</strong>: 39  </li>
<li><strong>AnonCoders</strong>: 35  </li>
<li><strong>r00t-x</strong>: 31  </li>
<li><strong>Shor7cut</strong>: 28  </li>
<li><strong>Owner Dzz</strong>: 27  </li>
<li><strong>Toxic Phantom FROM BANGLADESH BLACK HAT HACKERS</strong>: 27  </li>
<li><strong>TechnicaL</strong>: 21  </li>
<li><strong>virus3033</strong>: 21  </li>
<li><strong>Yuba</strong>: 17</li>
</ol>

<p><strong>GHoST61</strong> also topped the ranking last year and remains at the top at the moment. Other familiar names are: <strong>r00t-x</strong> (moved down 1 rank), <strong>TechnicaL</strong> (moved down 2 ranks) and <strong>virus3033</strong> (moved down 2 ranks). This means that 4 of out of the previous top 10 are still around, while the other 6 weren't listed before.</p>

<p><img src="https://blog.shodan.io/content/images/2016/01/Firefox_Screenshot_2016-01-18T10-01-00-904Z.png" alt="Tracking Hacked Websites"></p>

<p>In terms of organizations containing defaced websites, the <a href="https://www.shodan.io/report/nIBwjjHw">Ecommerce Corporation remains the most affected by far</a>. At this point it seems a given that Ecommerce will have the worst ranking so lets look at the other organisations on the list. The full ranking is:</p>

<ol>
<li>Ecommerce Corporation  </li>
<li>Unified Layer (+1)  </li>
<li>GoDaddy (-1)  </li>
<li>CyrusOne  </li>
<li>iServer Hosting  </li>
<li>SoftLayer Technologies  </li>
<li>Media Temple (-1)  </li>
<li>Peer1 Dedicated Hosting (-4)  </li>
<li>New Dream Network  </li>
<li>Digital Ocean</li>
</ol>

<p>The top 3 have remained the same, though GoDaddy and Unified Layer switched spots. New entries on the list are: CyrusOne, iServer Hosting, SoftLayer, New Dream Network and Digital Ocean. At this point it's clear that there are a few hosting providers with on-going problems and it doesn't look like they've made any impactful changes to reduce the number of compromised websites.</p>

<p>In terms of products, the vast majority of affected websites were running Apache:</p>

<p><img src="https://blog.shodan.io/content/images/2016/01/Firefox_Screenshot_2016-01-18T09-55-02-979Z.png" alt="Tracking Hacked Websites"></p>

<p>I'm planning on periodically revisiting this subject to see how things change over time, especially with regards to the newly-listed organisations!</p>

<p>PS: Credit to <a href="https://twitter.com/Viss">@Viss</a> for the dramatic hacker background image at the top.</p>]]></content:encoded></item><item><title><![CDATA[Top Website Defacers: June 2015]]></title><description><![CDATA[<p>I wanted to revisit the results of an earlier post this year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and see how things have changed since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the</p>]]></description><link>https://blog.shodan.io/top-website-defacers-june-2015/</link><guid isPermaLink="false">3ade232b-b91f-475e-8888-1b3c61a574f2</guid><category><![CDATA[Reports]]></category><category><![CDATA[defacements]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Sun, 14 Jun 2015 18:44:16 GMT</pubDate><media:content url="https://i.imgur.com/N6wnApM.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://i.imgur.com/N6wnApM.jpg" alt="Top Website Defacers: June 2015"><p>I wanted to revisit the results of an earlier post this year on how to <a href="https://blog.shodan.io/tracking-hacked-websites/">track website defacements</a> and see how things have changed since then. In case you're wondering how this data is collected, I've created a video that shows in real-time the commands I used to generate the data:</p>

<script type="text/javascript" src="https://asciinema.org/a/21387.js" id="asciicast-21387" async></script>

<p>Here's the Top 10 Website Defacers as of June 2015:</p>

<ol>
<li><strong>GHoST61</strong>: 49  </li>
<li><strong>El Moujahidin</strong>: 31  </li>
<li><strong>r00t-x</strong>: 29  </li>
<li><strong>Ashiyane Digital Security Team</strong>  </li>
<li><strong>Best Cracker</strong>: 22  </li>
<li><strong>TechnicaL</strong>: 20  </li>
<li><strong>virus3033</strong>: 17  </li>
<li><strong>A.N.T</strong>: 15  </li>
<li><strong>KkK1337</strong>: 14  </li>
<li><strong>MR Error ..</strong>: 14</li>
</ol>

<p><strong>GHoST61</strong> also topped the ranking earlier this year and remains at the top at the moment. Other familiar names are: <strong>r00t-x</strong> (moved up 4 ranks), <strong>TechnicaL</strong> (moved up 3 ranks) and <strong>Best Cracker</strong> (moved up 1 rank). This means that 4 of out of the previous top 10 are still around, while the other 6 weren't listed before.</p>

<p><img src="https://blog.shodan.io/content/images/2015/06/hacked-by-june-2015.png" alt="Top Website Defacers: June 2015"></p>

<p>In terms of organizations containing defaced websites, the <a href="https://www.shodan.io/report/ZuhSYkhV">Ecommerce Corporation remains the most affected by far</a>. After publishing the last blog post some people rightly questioned whether Ecommerce corporation had just been hit with an attack and I happened to do my report right afterwards. This follow-up data makes it clear that there are systemic problems at the company and how they setup/ respond to incidents.</p>]]></content:encoded></item><item><title><![CDATA[Tracking Hacked Websites]]></title><description><![CDATA[<p>A lot of website defacements leave the signature of the attacker. Whether it's the Syrian Electronic Army or a lone individual, they like leaving a message to get credit for their successful attack.</p>

<p><img src="http://www.extremetech.com/wp-content/uploads/2013/08/new-york-times-defaced-by-syrian-electronic-army-640x353.jpg" alt=""></p>

<p>One thing they tend to have in common though is that they start their signature with "Hacked</p>]]></description><link>https://blog.shodan.io/tracking-hacked-websites/</link><guid isPermaLink="false">7ca4ab61-b9e4-40f1-aafc-dd64a5de467a</guid><category><![CDATA[research]]></category><category><![CDATA[defacements]]></category><dc:creator><![CDATA[John Matherly]]></dc:creator><pubDate>Tue, 24 Feb 2015 06:20:58 GMT</pubDate><media:content url="https://i.imgur.com/N6wnApM.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://i.imgur.com/N6wnApM.jpg" alt="Tracking Hacked Websites"><p>A lot of website defacements leave the signature of the attacker. Whether it's the Syrian Electronic Army or a lone individual, they like leaving a message to get credit for their successful attack.</p>

<p><img src="http://www.extremetech.com/wp-content/uploads/2013/08/new-york-times-defaced-by-syrian-electronic-army-640x353.jpg" alt="Tracking Hacked Websites"></p>

<p>One thing they tend to have in common though is that they start their signature with "Hacked by". That makes it very easy to find hacked websites with Shodan:</p>

<p><a href="https://www.shodan.io/search?query=title%3A%22hacked+by%22">https://www.shodan.io/search?query=title%3A%22hacked+by%22</a></p>

<p>Based on this information there are roughly 2,000 websites the have been compromised recently and advertise it using the string "Hacked by". Unsurprisingly, the majority of the compromised websites are running on port 80 (HTTP):</p>

<p><img src="https://blog.shodan.io/content/images/2015/02/Tracking-Hacked-Websites---Shodan-services.png" alt="Tracking Hacked Websites"></p>

<p>What did surprise me however was that a huge chunk of the compromised websites were located on a single hosting provider:</p>

<p><img src="https://blog.shodan.io/content/images/2015/02/Tracking-Hacked-Websites---Shodan-org.png" alt="Tracking Hacked Websites"></p>

<p>The <a href="http://www.ecommerce.com/">Ecommerce Corporation</a> accounts for 25% of the "hacked by" results in Shodan. Almost all servers are running Apache and PHP, though they're not all on the same version. Their website talks about helping businesses grow and doesn't immediately discuss hosting, but the About page does mention their affiliation with <a href="http://www.ixwebhosting.com/">IX Web Hosting</a>. Whatever they're doing, they are configuring their systems in a way that appears to make them a big target for defacements.</p>

<p>I was curious to see which attacker had compromised the most hosts, so I downloaded the data using the <a href="https://shodanio.wordpress.com/2014/12/01/using-shodan-from-the-command-line/">shodan command-line tool</a>:</p>

<pre><code>shodan download --limit -1 hacked 'title:"hacked by"'
</code></pre>

<p>This saves the results into a file called <strong>hacked.json.gz</strong>, which I then ran the following command on:</p>

<pre><code>shodan parse --fields title hacked.json.gz | \
    grep -i "hacked by" | \
    sed -e 's/.*hacked by//i' | \
    sort | \
    uniq -c | \
    sort -k1nr -k2d | \
    head -10
</code></pre>

<p>The <strong>shodan parse</strong> command extracts the <strong>title</strong> information out of the banners, which are then filtered using grep to ensure only websites that contain "hacked by" in that order get further analyzed. Then I strip out everything that is shown before the "hacked by" string using sed thereby creating a list of attacker names. That list is then sorted, the uniques are counted, sorted by number of occurrence and finally the top 10 results get printed to the terminal. And with that I can present the <strong>Top 10 Website Defacers</strong>:</p>

<ol>
<li><strong>GHoST61</strong>: 57  </li>
<li><strong>OxFoRD &amp; Omis Exe</strong>: 54  </li>
<li><strong>Kuroi'SH</strong>: 41  </li>
<li><strong>Oum99</strong>: 40  </li>
<li><strong>Oussama911</strong>: 37  </li>
<li><strong>Best Cracker</strong>: 35  </li>
<li><strong>r00t-x</strong>: 31  </li>
<li><strong>Prodigy TN</strong>: 25  </li>
<li><strong>TechnicaL</strong>: 25  </li>
<li><strong>koat<em>_</em>halk<em>_</em>palesten</strong>: 24</li>
</ol>

<p>Note that I only counted unique names, i.e. if the attacker mis-spelled their name (ex. <strong>Elmaghiribi</strong> vs <strong>Elmaghribi</strong>) or has several variations (ex. <strong>muhmademad</strong> vs <strong>MuhmadEmad</strong>) then they would get counted separately. And much the same way Time magazine's person of the year 2006 was you, apparently <strong>you</strong> is also accountable for at least 4 of the defacements.</p>

<p>PS: The header image for this post was created by the amazing <a href="https://twitter.com/Viss">Viss</a> and you can find the whole gallery at <a href="https://imgur.com/gallery/W7f8K">https://imgur.com/gallery/W7f8K</a></p>]]></content:encoded></item></channel></rss>