The Jester (hacktivist)
IdentityThe Jester has stated that he was a former soldier and had served in Afghanistan and elsewhere.[3] A former defense operative claimed that The Jester was a former military contractor involved in US Special Operations Command projects.[2] ActivitiesOn January 1, 2010, The Jester began a campaign against Jihadist websites. His first target was alemarah.info, which was the Taliban's website at the time.[4][5] The Jester posted several tweets claiming to be responsible for the downtime WikiLeaks was experiencing.[2] On November 29, 2010, someone claiming to be The Jester stated that he had been raided by the U.S. and attempted to solicit money for legal fees. The Jester purported that the person was an impostor, though writers at InfoSecIsland believe the hoax was created by The Jester himself.[6][self-published source][7] In February 2011, The Jester claimed credit for a DoS attack on several sites belonging to the Westboro Baptist Church for celebrating the death of homosexual U.S. servicemen.[8] In June 2011 The Jester vowed to find and expose members of LulzSec.[9] He attempted to obtain and publish personally identifiable information of key members within the group, whom he described as "childish".[10] In March 2011, Barrett Brown said The Jester was trying to identify members of Anonymous with Backtrace Security, a group of former members of Anonymous who disagreed with the current Anonymous.[11][12][13] On June 24, 2011, he incorrectly claimed to have revealed the identity of LulzSec leader Sabu as an information technology consultant possibly from New York City.[14] In July of the same year, he falsely accused a Portuguese IT professional of also being Sabu, leaving The Jester's outing claims to be considered suspect.[15] However, in a post on his blog in November 2011, The Jester retracted his prior identifications for "Sabu", issued an apology and correctly identified "Sabu" as Hector Xavier Monsegur, 28, of New York.[16] Sabu's identity was confirmed on March 6, 2012, when Monsegur was arrested by the FBI and it was revealed that he had been acting as an FBI informant in the interim.[17][18] On March 5, 2012, The Jester changed his Twitter account avatar from his signature Jester icon to a QR code without comment or explanation.[19] Scanning a QR code redirects a browser to a website. Scanning The Jester's icon led to a URL where he had an image of his signature Jester icon and an embedded, hidden code that allegedly exploited a vulnerability that affects Safari, Chrome and Android browsers.[19] "When anyone scanned the original QR code using an iPhone or Android device, their device would silently make a TCP shell connection back to my remote server," The Jester wrote.[19][20] This was however exposed to be fake[21] and the exploit was stolen from a 2-year-old CVE advisory.[22] On May 14, 2012, The Jester's Twitter account appeared to have been deleted, along with all posts on his WordPress blog.[23] However, the Twitter account and WordPress blog were merely temporarily deactivated and were subsequently restored May 16, 2012.[24] On July 2, 2013, The Jester took responsibility for a series of DoS cyberattacks against the Ecuadorean stock exchange and the country's tourism website, and promised to attack any other governments considering granting asylum to NSA leaker Edward Snowden. In tweets, The Jester also alluded to a plan to seize control of the fire alarms at the Ecuadorean embassy in London, which would force WikiLeaks founder Julian Assange to set foot on UK soil and face potential extradition to Sweden to face sexual assault charges.[25] On October 21, 2016, The Jester took responsibility for "defacing" the official website of the Russian Ministry of Foreign Affairs. The "hack" was later shown to be fake.[26] References
|