Last September 28, BurmeseHackers Group Hacked Irrawaddy Online Store twice, and we’ve been discussed about that.

After a month, 27/09/2010: Irrawaddy, Mizzima and the Democratic Voice of Burma (DVB), were attacked on last Monday,

According to their official sites, The attacks coincided with the anniversary of the 2007 “Saffron Revolution.” A similar attack was launched against exile media in September 2008, on the uprising’s first anniversary. Websites were crippled for several days. The Irrawaddy’s website host in the US reported that the volume of the DDoS attack on The Irrawaddy was 4 gigabytes, 3 gigabytes larger than in September 2008.

The massive cyber attacks that shut down The Irrawaddy and Mizzima  came largely from Chinese internet provider addresses, while the attacks on the DVB website, measuring about 120 megabytes per second, came from Russia, Georgia, Israel, Kazakhstan, Ukraine and Vietnam.

In September 2008, the website was also attacked by a DDoS attack. The volume of the DDoS attack on Monday was 2 gigabytes, one gigabyte larger than the attack in Sept. 2008, according to Win Thu, the general manager of The Irrawaddy. Win Thu said that the attack would be short-term, but it has disrupted the daily news production and access by our readers. Hackers began the attack on the English and Burmese website address: www.irrawaddy.org at 1 a.m on Monday and later attacked The Irrawaddy’s mirror website: www.irrawaddymedia.com.

I can’t tell exactly and there’s no comment right now. I just wanna ask myself “Is it a begin of Myanmar Cyber War?”

Explore More

Devilzc0de SQL Injection Tool (mysql&mssql)

Ok guys welcome to new product from Devilzc0de, this time we dedicate this all in one sql injection tool for you.So.. what is devilzc0desql? this is a very sophisticated sql

XSS Stealing Cookies

This method (XSS attacks) is for get the cookies users, so, for get information of users… and then, login into the account of the victim user…u will have to give

Detecting and Preventing Social Engineering and other Hacking Processes

Social engineering attacks are growing fast, and today majority of attackers use social engineering techniques to infiltrate into a victim’s network. It is very difficult for a technician to identify