GhostSec

GhostSec played a big role in this operation with their NISLT hack which exposed the Nigerian government for money laundering and embezzling of thousands of dollars.

We GhostSec would also like to take this opportunity to educate the viewers who are reading this blog that the media news outlet are misinterpreting GhostSec as part of “Anonymous.” It has come to our attention that some media outlets especially Protests.media decentralized news collective of researchers aren't aware of GhostSec's history and sometimes they get often confused that we are a part of anonymous. However, the reality is we are our own group and it was started by two main founders which are Sebastian Dante Alexander and Ghost3301 before others joined and gained popular in year 2015. The readers need to understand that being part of the anonymous collective doesn’t always means that most of the time they are considered as hacktivists.

To define anonymous ideology simply as, an unknown identity that has a motive to bring a social change to the globe by fighting the whole corrupted system which is cruel and dysfunctional that must put an end for using power and knowledge for the greater good. In other words, anyone can become part of the collective to the movement to fight against internet oppression and surveillance in the cyberspace. Regardless if they’re considered as activists or hacktivists as long they made contribution for the public’s interest to spread awareness to educate ourselves about what is happening the planet of earth. What makes it different from GhostSec? We are a group of vigilante hackers with different skill sets who are willing to use hacking for the name of justice to expose corruption and any kind of injustice. For more details read this blog post.

We demand the media or any journalist who are willing to publish anything related to our hacks by in return that they must give us proper credits including others who are affiliated in the #OpNigeria. Why do we care about recognition? Because as a group it does matter to us by showing the globe that it is possible and also to spread influence by vigilantes who care about righteousness. We've particated the #EndSARS movement while during the hashtag was trending to put expose more of the government's tyranny and corruption.

While the article has explained about the money embezzlement that we’ve managed to penetrate NISLT website. Here’s another post that nobody was able to take notice. This image explains that we were probing the network that was exposed on the internet by the time we infiltrated TelecompsHoop’s internal network which is Nigeria’s ISP. We’ve managed to gain access all their computers throughout the network that contains outdated software that was not updated that contains many vulnerabilities. Ghost3301 provided us strong evidence that TelecompsHoop's security was a hoax including no DDoS (Distributed Denial of Services) protections.

Any journalists who are willing to give us an interview must accept our reasonable conditions that is related must credit us.

Contact details

Email: ghostsec420@protonmail.ch

Twitter: https://twitter.com/_GhostSec_ and https://twitter.com/SebastianDAlex

Telegram: https:/t.me/GhostSecc/

References

1) https://ghostsec.writeas.com/introduction-to-ghostsec

2) https://protests.media/end-sars-solidarity-protests-take-place-all-over-the-world/

3) https://t.me/GhostSecc/12

4) https://twitter.com/_gHOST3301_/status/1321284777362804740

GhostSec started working on OpVindicator and their objectives was leaking 8kun's mail logins to Kirtaner (Aubrey Cottle) which was then used for Kirt's leak on OpVindicator and Qanon. Later GhostSec went silent on OpVindicator after for a month later or so they came back with a huge leak revealing a ton of information on the USA and the governments worldwide, “Qanons” and so much more. The leak can be found here.

OpISIS has begun again with an immediate comeback from GhostSec as they leaked ISIS camps in Iraq. Next attacks in Iraq which were ignored by US Governments due to it not coming from GSG (GhostSecurityGroup) “Michael Smith”. USA government turned down the Intel, they then leaked intel on ISIS's shipments imports and exports all posted on their telegram then they leaked Intel on the employees and found many suspicious names with exporting details such as explosive chemical compounds like fertiles and nitrate.

Same ones that have caused the Beirut explosion they also leaked hundreds of ISIS accounts on the pastebin and their telegram channel by taking them all down and making the internet safer without those ISIS recruiting terrorists. Moreover, GhostSec then have leaked images of ISIS's weapons on the Irap Camp which we recently mentioned. It is also mentioned where they were planning to hit next, which once again was completely ignored by their contacts.

GhostSec is profiled as a group of “vigilantes” and launched against ISIS websites that advocate Islamic extremism. According to experts of online Jihad activism, the group gained momentum after the Charlie Hebdo shooting in Paris in January 2015. The group took credit by shutting hundreds of ISIS-related websites and social media accounts and prevented the adversary attacks by working together with the law enforcement and intelligence agencies. The group uses a hashtag such as #Ghostsec to promote themselves in social media.

GhostSec obtained knowledge that the terrorist planned a strategy to attack in New York and Tunisia and the Intel was sent and received from law enforcement. Briefly after the members of GhostSec decided to part ways by opposing changing the name into Ghost Security Group as reform to cut ties with anonymous. The old name of “Ghostsec” has maintained as associates with Anonymous. Both groups continuously stopping the ISIS.

Over the years since 2015 the first time they gained momentum they have done many operations, and getting more involved in the “Hacktivism scene” they have a twitter account and still use tags like #GhostSec on social media and on their twitter the hacker group in 2018-2019 was heavily involved in an operation and they called it OpChildSafety.

OPCHILDSAFETY 2018-2019

GhostSec took down 1k+ pedos and even exposed boychat which is a paedophile dark web server with over 82,000 users and 7000 different web addresses inside of it.

OPKKK 2020

GhostSec originally posted this operation on twitter supporting everyone involved they also allegedly backdoored a KKK chatroom, on their twitter account they posted the KKK Main Bitcoin wallet which has over $600 million dollars in their BTC wallet.

OpPeta 2020

A few anonymous members started with #OpPETA movement by making a video then GhostSec decided to recruit and assist them by leaking PETA's mail servers, and targeting the MedicalLab’s servers that is originated from Taiwan where they held animal testing. The medical company kept records of receipts but was deleted soon after GhostSec posted a twitter message by claiming that they found it. However, it was too late and all that is left where the emails that were associated with PETA’s emails in the servers as evidence. Also a full youtube video for OpPeta by GhostSec.

OpLebanon 2020

OpLebanon from GhostSec also started with a video and shortly right after. The hacker group posted all the government sensitive data such as, emails with login details that belongs to the Lebanese government. After a sudden explosion that happened in Beirut. GhostSec went quiet for a while until they suddenly returned by exposing a hacker group which are responsible for helping the Hezbollah and Iran Regime. They also found the groups main command and control panel for hacking innocents of people human rights activists and journalists, and they were able to clear the data of what's left of it so the citizens continue the protest. After they compromised the Lebanese targets from the group that goes by The Ansar Group. They are responsible for exploiting hospitals, hotels, airports, etc. They were state sponsored by the Hezbollah and Iran’s regime to silence the critics for speaking out the truth. GhostSec even wiped their panel/server securing all infected targets. An article on GhostSec's work during OpLebanon.

Daniel's Chat Goes down

On March 10th 2020, hackers targeted one of the most prominent anonymous website hosting providers on the darknet, Daniel Winzen, subsequently knocking over 7,500 hidden services across Tor offline. DarkOwl analysts, who regularly monitor the darknet directly, observed this event occur via DarkOwl’s Vision platform and have spent recent days reviewing what happened to quantify the impact to the darknet. The hacker group GhostSec announced at Around 01:00 UTC in the early hours of March 10th 2020, members present in Daniel’s Chat were surprised to see their super admin, @daniel online. Since the last attack against Daniel’s Hosting services in November 2018, @daniel rarely visited the chatroom, blaming member-infighting and a busy work schedule. It took no time to notice that the topic for the chatroom had been modified to “ALL YOUR BASE ARE BELONG TO US. ALL SHALL BOW BEFORE ME OR FACE MY WRAITH” and @daniel was not actually commanding his account in the chatroom. On March 3rd 2020, a guest by the name of @Sebastian entered Daniel’s Chat and stated “GhostSec is watching you,” adding that they had taken control of discord servers of Daniel’s – servers that members in the chat didn’t know he even had.

Shortly before getting kicked from the room, @Sebastian posted a fingerprint and claimed Daniel was compromised while accessing child pornographic content called, Tiny Voices. Sebastian is also the moniker and name of the leader of the anti-pedophilia hacking group formerly known as Ghost Security (#GhostSec). Sebastian Dante Alexander, who uses the Twitter handle, @SebastianDAlex, is a vigilante hacker known for tracking and de-anonymizing criminals who harm children. they have a new twitter handle at https://twitter.com/_GhostSec_ as their previous one was suspended.

GhostSec FAQ

Q1) What is GhostSec? A1) GhostSec is a vigilante group that has been around for a long time.

Q2) When did GhostSec from? A2) We were first on Galaxy 2 which is a deep web social media platform during the time in 2014 but we did not gain popularity till 2015.

Q3) What makes GhostSec different from anonymous? A3) We are considered offshoots of anonymous although we are our own group. We support the anonymous idea/movement.

Q4) Is GhostSec different than Ghost Security Group? A4) Yes. We did split from Ghost Security Group as we didn’t accept their movement. GSG is government owned that is owned by Michael Smith.

References

1) https://github.com/ghostsec420/Opchildsafepart2 (OpChildSafety Data Dump)

2) https://www.youtube.com/watch?v=aD0WfgngGAE (OpPeta Video)

3) https://www.youtube.com/watch?v=HMj7AJh-WR4 (OpLebanon Video)

4) https://twitter.com/Anonleb3/status/1292943542478753792 (Ansar Group Exposed)

5) https://www.darkowl.com/blog-content/daniel-hosting-goes-dark-for-good (DarkOwl Analysts)

6) https://ginosblog.com/ghostsecs-oplebanon-over-100-govt-usernames-and-passwords-dumped-online-79bb36854843 (GhostSec’s #OpLebanon: Over 100 Govt Usernames and Passwords Dumped Online)