Jom Heboh di Kuching Sarawak - Jun 2011

TV3 telah mengadakan Karnival Jom Heboh di Stadium Petrajaya, Kuching Sarawak pada 4 & 5 Jun 2011.


Jom Heboh Sarawak akan digegarkan dengan siaran langsung Konsert Jom Heboh yang akan diadakan pada hari Ahad (5 Jun 2011) jam 9.00malam dari Pentas Utama, tapak Karnival Jom Heboh di Stadium Petrajaya yang menampilkan artis-artis popular seperti;
Mas Idayu


Black


Akim


Stacy


6ixth Sense


Projek Pistol



Konsert ini akan diacarakan oleh Aidid Marcello dan Adzriefaiz Adzlan (Faiz) dimana negeri Sarawak merupakan lokasi yang kedua dalam siri penjelajahan Jom Heboh edisi 2011 untuk mengadakan siaran langsung Jom Heboh selepas Kuala Terengganu.




Artis-artis yang turun padang ke Jom Heboh Sarawak termasuk para pelakon dari drama Juvana seperti Zahiril Adzim, Irfan Roslan dan Johan Ariff, Nora Danish (Lestary: ANA LU’LU), Danny X Factor dan Allana Amir dari Lagenda: Ahmad Albob Yang Punya, Ana Dahlia (Akasia: Nora Elena), Epul Kumpulan Drama, Salma Mentor 5, Sham (Sarapan), Amat dan Azahari (Bang Bang Boom), Zizan & Dira Abu Zahar (Melodi), pasangan adik beradik Adi dan Ila (Mentor 4), Munir, Azza Elite, Anne Ngasri serta penampilan personaliti TV3 seperti Maria Tunku Sabri, Hazlin Hussain, Hasfizza Aswaty, Hazrena Mohd Kassim, Tabah Syazwan, Norliza Md Zain, Saiful Nizam, Yasir Mansor, Mior Abdul Malek Raiyani Aidid Marcello dan Adzriefaiz Adzlan.

Ini pula anak buah saya, Nurfakriah Binti Suhardi @ Dedek sedang bergambar di sebalik nama besar JOM HEBOH. Ramai pengunjung yang bergambar di sini.


Haaa....di sinilah tumpuan kanak-kanak bermain. Tapak ini dikenali sebagai Disneyland Jom Heboh. Bayaran masuk adalah sebanyak RM2.00 sahaja. Murahkan?.. Tempoh bermain dikenakan selama 15 minit. Memang menghiburkan. Tetapi orang dewasa atau ibubapa tidak dibenarkan masuk ke kawasan ini. Hanya kanak-kanak berusia 12 tahun ke bawah sahaja dibenarkan untuk bermain di sini.












Ok, yang ini pulak kenal ker??? Siapa lagi kalau bukan pelakon komedi terkenal dalam rancangan Ahmad Albob Yang Punya. Siapa lagi.....Danny X-Factor la...Memang kelakar orangnya...Auw gitu! Hikhik... Disebelahnya pula, chef Malaysia yang tersohor iaitu Chef Malik. Gandingan artis ini memang ideal dalam aktiviti memasak Mee Maggie sempena program Jom Heboh pada masa itu. Kalau nak tahu, Chef Malik ini boleh berbahasa Sarawak. Hmmmm...tabik springgggg!






Beberapa Web Kerajaan Digodam Sebelum Anonymous Bertindak



16 JUN 2011

Seperti sedia maklum, kumpulan pengodam yang dinamakan Anonymous telah pun mengatakan yang mana mereka akan godam laman kerajaan, Malaysia.gov.my pada pagi ini, sekitar 3 pagi kelak. Namun begitu, lebih awal daripada itu, ianya kelihatan beberapa laman kerajaan telah pun diserang oleh penyokong mereka.

Sehingga kini, antara laman web yang telah digodam, termasuklah halaman web; CIDB.gov.my



JBiotech.gov.my


UiTM Penang


TourMalaysia.com.my


KRU Studios


Parlimen.gov.my dan beberapa laman lagi.



Laman Malaysia.gov.my juga kelihatan seperti tidak boleh diakses, dan seperti dibawa ke halaman Staging.Malaysia.gov.my.


Buat masa ini, ianya kelihatan yang mana beberapa laman web telah digantikan halamannya, serta beberapa yang lain digodam menggunakan DDOS.

IGP: Ugutan godam laman web kerajaan, Malaysia tingkat sekuriti



KUALA LUMPUR, 15 Jun — Malaysia mula meningkatkan tahap keselamatan ekoran ugutan bahawa laman web rasmi kerajaan akan digodam oleh kumpulan yang menggelar diri mereka Anonymous berikutan langkah pihak berkuasa mengadakan tapisan program hiburan dan menjejaki aktivis.

“Kami ada menerima kata-kata ugutan ini. Banyak agensi terlibat dalam ini dan kami akan bertindak,” kata Ketua Polis Negara Tan Sri Ismail Omar kepada Reuters hari ini.

“Siasatan perlu dijalankan dan kami harus melindungi sistem kami pada masa yang sama,” katanya.

Laporan Reuters juga berkata, Malaysia menjadi negara terbaru berhadapan dengan sasaran perang siber yang digerakkan oleh aktivis, yang mula popular apabila mereka mengganggu laman web MasterCard dan Paypal yang memutuskan perkhidmatan kewangan kepada Wikileaks.

Mereka juga ada hubungan dengan kumpulan-kumpulan yang pernah menggodam laman web di Syria, Tunisia, Mesir dan India.

Menurut Reuters lagi, dalam satu lagi makluman disiarkan di laman pastebin.com, Anonymous berkata tindakan Malaysia menapis program televisyen dan filem dan menghalang laman-laman perkongsian fail menyebabkan pihaknya mengambil tindakan mahu menggodam laman web http:www.malaysia.gov.my.

“Internet adalah untuk kebebasan, tanpa rasa takut dengan campur tangan kerajaan,” kata kumpulan itu.

“Kami bimbang bahawa jika anda membuat keputusan susulan untuk membuang kebebasan awam. Kami bertanggungjawab untuk bertindak pantas dan tiada belas kasihan,” katanya.

Pada 2009, Malaysia bercadang untuk mengadakan sistem tapisan Internet, yang mirip projek Green Dam yang diperkenalkan oleh China.

Bagaimanapun seperti juga di China, Malaysia berundur daripada melaksanakannya ekoran kritikan banyak pihak.

Mengikut laporan media semalam, Anonymous mengancam untuk menggodam laman web kerajaan di bawah “Operation Malaysia” awal pagi esok.

Kumpulan itu menghantar mesej mengatakan bahawa ia akan menggodam pada pukul 3.30 pagi esok waktu Malaysia ( 7.30 petang ini, waktu GMT).

Ugutan itu dibuat dalam bentuk grafik disiarkan di lamab web http://i.imgur.com/PTFWh.png.

Mikko Hypponen, ketua pejabat penyelidikan di F-Secure Corporation, sebuah firma sekuriti perisian yang berpejabat di Helsinki, Finland menghantar mesej mengenainya menerusi Twitter kira-kira 4.42 pagi semalam (waktu Malaysia).

Laman web rasmi kerajaan tidak boleh diakses, 51 digodam



June 16, 2011

KUALA LUMPUR, 16 Jun — Operation Malaysia yang dilancarkan oleh kumpulan penggodam antarabangsa, Anonymous bukan sahaja menggodam laman web rasmi kerajaan, tetapi juga melancarkan serangan ke atas sekurang-kurangnya 50 laman web yang lain.

Senarai itu termasuklah lima laman web kerajaan, antaranya Kementerian Penerangan, Komunikasi dan Multimedia, jabatan bomba dan Suruhanjaya Pengangkutan Awam Darat.

Meskipun ugutan kelmarin mengatakan bahawa serangan ke atas laman web rasmi kerajaan akan dilancarkan awal pagi ini tetapi beberapa laman web dan portal sudah mula diserang sejak petang semalam.

Suruhanjaya Komunikasi dan Multimedia Malaysia (SKMM) mengesahkan perkhidmatan 41 laman web terganggu ekoran serangan sejak semalam.

“Pemantauan kami mengenai situasi menunjukkan tahap serangan menurun setakat pukul 4 pagi tadi,” kata SKMM dalam satu kenyataan hari ini.

Ia menambah, impak serangan itu ke atas pengguna Malaysia adalah kecil,

SKMM menambah, lamannya juga berhadapan dengan serangan penggodam yang tidak dikenali dan setakat ini berjaya menangani serangan pihak terbabit.

Sehingga pukul 10.30 pagi tadi, laman web www.malaysia.gov.my tidak dapat diakses manakala penggodam-penggodam lain juga menyasarkan laman web agensi pelancongan Sabah www.sabahtourism.com dan www.tourmalaysia.com.my.

Ia menambah, impak serangan itu ke atas pengguna Malaysia adalah kecil,

SKMM menambah, lamannya juga berhadapan dengan serangan penggodam yang tidak dikenali dan setakat ini berjaya menangani serangan pihak terbabit.

Sehingga pukul 10.30 pagi tadi, laman web www.malaysia.gov.my tidak dapat diakses manakala penggodam-penggodam lain juga menyasarkan laman web agensi pelancongan Sabah www.sabahtourism.com dan www.tourmalaysia.com.my.

Dengan menyerang laman web Sabah Tourism, penggodam mendakwa mereka telah memperoleh data melibakan lebih 3,400 pengguna agensi itu dan menyiarkan butiran 392 akaun.

Sabah Tourism yang dapat menstabilkan akses meletakkan notis “offline” di muka depan lamannya.

Bagaimanapun laman web Tour Malaysia kekal dengan paparan “Dragon Force” dan lagu “heavy metal” berjudul “Through The Fire And The Flames” dan mesej mengecam kerajaan menghalang akses kepada beberapa laman web.

Malaysia menjadi negara terbaru berhadapan dengan sasaran perang siber yang digerakkan oleh aktivis, yang mula popular apabila mereka mengganggu laman web MasterCard dan Paypal yang memutuskan perkhidmatan kewangan kepada Wikileaks.

Mereka juga dilaporkan ada hubungan dengan kumpulan-kumpulan yang pernah menggodam laman web di Syria, Tunisia, Mesir dan India.

Laporan Reuters semalam menyebut, Anonymous mendakwa tindakan Malaysia menapis program televisyen dan filem dan menghalang laman-laman perkongsian fail menyebabkan pihaknya mengambil tindakan mahu menggodam laman web http:www.malaysia.gov.my.

Pada 2009, Malaysia bercadang untuk mengadakan sistem tapisan Internet, yang mirip projek Green Dam yang diperkenalkan oleh China.

Bagaimanapun seperti juga di China, Malaysia berundur daripada melaksanakannya ekoran kritikan banyak pihak.

Mengikut laporan media semalam, Anonymous mengancam untuk menggodam laman web kerajaan di bawah “Operation Malaysia” awal pagi ini.

Kumpulan itu menghantar mesej kelmarin mengatakan bahawa ia akan menggodam pada pukul 3.30 pagi ini waktu Malaysia.

Ugutan itu dibuat dalam bentuk grafik disiarkan di lamab web http://i.imgur.com/PTFWh.png.

Dalam pada itu, laman web akhbar tempatan New Straits Times (nst.com.my) juga tidak dapat diakses setakat pukul 10 pagi tadi, tetapi tidak pasti sama ada ia disebabkan oleh serangan siber ataupun sebaliknya.
June 15, 2011

KUALA LUMPUR, 15 Jun — Tindakan yang sewajarnya sedang diambil bagi menghalang cubaan menggodam laman web rasmi kerajaan, yang dilaporkan akan dilakukan awal pagi esok, kata Menteri Penerangan, Komunikasi dan Kebudayaan Datuk Seri Dr Rais Yatim.



Ugutan itu dikeluarkan awal pagi semalam.

Mengulas laporan bahawa satu kumpulan dari luar negara dikenali “Anonymous” mahu menggodam laman web www.malaysia.gov.my, beliau berkata, perkara itu adalah sesuatu yang tidak dijangka tetapi ancaman serupa pernah dibuat sebelum ini.



“Kita telah memberitahu perkara ini kepada pihak-pihak berwajib, dan kita telah mengambil tindakan pencegahan yang perlu menerusi Mampu, Suruhanjaya Komunikasi dan Multimedia Malaysia serta agensi-agensi yang bertanggungjawab mengenai keselamatan,” katanya kepada pemberita selepas merasmikan Sidang Kemuncak Penulis Blog dan Media Sosial Sedunia 2011 di sini hari ini.

Dipetik Bernama Online, Rais berkata kerajaan juga sedang bersiap sedia menghadapi kemungkinan berlaku serangan.

DIGODAM - Laman CIDB Malaysia diserang Anonymous



Sekitar jam 4.20 petang waktu tempatan, laman web rasmi Construction Industry Development Board (CIDB) (www.cidb.gov.my) mula digodam oleh Anonymous.

Header dan tajuk laman tersebut diganti dengan Operation Malaysia [pwn3d by Anonymous] dan footer diganti dengan;

"Greetings, Malaysia, We have seen the censorship taken by the Malaysian government, blocking sites like The Pirate Bay, and WikiLeaks. Malaysia is one of the world’s strictest governments, even blocking out movies, and television shows. These acts of censorship are inexcusable. You are taking away a basic human right. The internet is here for freedom, without fear of government interference. Do not think that no one else notices. Your structured government has done the talking, and we hear loud and clear. Let this be an announcement to all your people. This is a sign, a warning, and an opportunity to listen to ideas above your own. In a way you are being stubborn. But how will this help anyone or your country. We fear that if you make further decisions to take away human freedom. We are obligated to act fast and have no mercy. For rules were meant to be broken. And corruption was meant to be washed away and forgiven. Now we will wash your corruption away so be prepared. Take this as a favour."

Menurut sumber, laman web ini diserang oleh RileksCrew sebagai ‘buah mula’ sebelum serangan Anonymous. Bersiap sedia Malaysia!

Akaun email GMail yang DIGODAM dan domain yang ditukar



Sesiapa yang ada email GMail pastikan di bahagian 'settings' dan kemudian --> di bahagian 'Filters' dan 'Forwarding and POP/IMAP' tidak terdapat sebarang penambahan yang tidak anda pernah lakukan. Jika tidak terjadi seperti pengguna di bawah ini yang domainnya telah dihijack.

Jika terdapat sebarang perubahan sila pastikan anda menukar semua password atau apa sahaja dokumen penting yang perlu dilakukan. Walau bagaimanapun masalah ini telah dibaiki oleh pihak Google. Cuma pastikan email anda telah betul-betul bebas.


Gmail Hacked! Check your Gmail filters now!
David Airey has lost his domain after his Gmail account was hacked by a hacker. But how did the criminal can take down David’s domain? You can read the full story here but if you want to know how the attacker did it, please read on.

First, the victim login to his Gmail account as normal. Then he visit to a website which contains a script that exploiting the vulnerability in Gmail. This script will create a new filter in the victim’s email. Like in the example above, the script creates a filter that will forward any email that has attachment to collect@evil.com.
But how about if the filter is set to forward all incoming emails to the attacker email? Do you will happy losing all your secret and passwords to the attacker? Of course you are not.
I have checked my filter settings in Gmail. Know what? There is a filter that forward incoming emails to *@colmac.com. I was shocked and removed it immediately. I do not know since when the filter was added and how many emails the guy at colmac.com had read. I hope they are happy what they are doing.
If you using Gmail, check your Gmail filters now. Who knows, maybe you are lucky and get strange filters in your Gmail settings. However, Google has fixed this problem but you are still be advised to check your filter settings.
************************************************
WARNING: Google’s GMail security failure leaves my business sabotaged

Published on December 24th, 2007
GMail hacked
What would you do if a criminal stole something very personal, and very valuable from you?
What if they were able to target your business and criple your income?
You wouldn’t be too happy now, would you?
What if you also discovered that this was happening because of a Google security infection that can affect every GMail user on the planet?

That’s what has just happened to me, and here I’m going to tell you my story. I will detail everything I know about the web pirates who are threatening my livelihood, and tell you what you need to know in order to avoid the same thing happening to you.
On November 20th 2007 I left the UK to spend a month’s holiday in India. I’d been planning this break for over a year, and was looking forward to taking my girlfriend away on our first foreign trip together. Prior to leaving, I published a blog post to let my readers know I’d be away for a while, and that my blog would be a quiet place in my absence.
All my clients were informed, bills paid, loose ends tied up, and off I went on a new adventure.
I arrived in Mumbai on November 21st, and on the journey from the airport to the Colaba district, was punched in the face by an Indian youth, but that’s another story.

During the month ahead, I knew I’d be irregularly checking my emails, but only to let my loved ones know everything was fine. This holiday was to be a break from work, and a break from computers.
Indeed everything was fine for a few weeks, until December 15th (five days before I was due to return from holiday). I called into an internet caf� in Goa, and read some worrying emails from good friends of mine. I was informed that my website had disappeared, and that my domain name (www.davidairey.com) was now redirecting to some random website - bebu.net.
I was confused, and anxious. How could this happen? I hadn’t received any notification of my domain name expiry, and I never divulge any passwords to anyone. The only possible explanation for me was that somehow, the domain name had expired without me receiving any notice, and that some domain poacher had snapped it up before I got a chance to renew.
My website had been pulling in over 2,000 unique daily visits. Not a massive amount by any stretch of the imagination, but for a one-man operation, 700,000+ annual visitors can generate a nice amount of new logo design business.
So I ran a WHOIS check on davidairey.com, hoping to find an email address for the new owner. The search yielded this email address: DAVIDAIREY.COM@domainsbyproxy.com and here’s the email I sent:

Hello,
Please can I purchase my old domain name from you. It seems it expired without my knowledge.
www.davidairey.com
Kind regards,
David


I found it hard to believe that I’d let my domain name expire, but thought it a good idea to send an email nonetheless.
On the very same day, I received a reply. It came from one supposed Peyam Irvani, telling me the following:

Hello,
Please send me your high offer !
Regards

By this stage, I’d already had some back and forth email discussions with close friends, wondering what exactly could have happened. I also contacted my web host company, ICDSoft, asking them to help. They were the ones who sold me the domain name after all. Shouldn’t they have informed me?
This is when I found a disturbing support ticket, posted in my web host support panel. It was supposedly from me, addressed to ICDSoft’s support team, and was created on November 20th, the exact date of my departure from the UK. It read the following:

Subject: Davidairey.com Transfer
Hello,
I want to transfer davidairey.com to another registrar please unlock it and send me the EPP transfer code.
Kind regards,
David


Within just one minute (ICDSoft’s support team are very fast) the following response had been supplied:

Hello,
We unlocked your domain name as requested. Here is its EPP code:
Domain name: davidairey.com
Auth/EPP key: 6835892AE0087D66
Best Regards,
Support


I immediately typed a reply to this ticket, asking for help, and wanting to know what I could do to resolve the situation. Here’s what I was told by the support team:

Unfortunately, the domain name has been transferred successfully, and it cannot be reverted. The current registrar may be able to give you more information.
The original ticket message was sent from this IP address: 207.36.162.100
The person who posted it must have had access to your email, too, because transfers have to be approved by the administrative contact in order to be successful.

What? Not only did the hacker gain access to my web host control panel, but they also squirmed their way into my email account? This is when I began to get very worried. I kept a lot of personal emails behind my username and password, and this was a real invasion of privacy. For a few minutes I sat in the net caf�, my girlfriend beside me, and I didn’t know what to think.
I sent an email to GoDaddy, where my domain had been illegally transferred to, and asked them to prevent any further transfers. I wanted the domain in one place whilst I investigated. Here’s what GoDaddy said:

Unfortunately if a transfer request is made and completed we will not be able to prevent this unless we receive the notice from a court or arbitration forum… I apologize for any inconvenience this may cause.

Okay, so GoDaddy can’t help until the matter is taken to court.
This whole process ran over a few days of my holiday, as GoDaddy took over 48 hours to respond. At this point, and on December 19th (four days after my first email to the web pirate, ‘Peyam’), I thought I’d send a reply, and here’s what I said:

Hello Peyam,
Well, congrats on your hack. I’d love to know how you did it.
Before this moves through the courts, in order to settle the dispute, I don’t suppose you’d be so kind to give me my domain back? It’d really save me a lot of hassle, but if that’s what it takes, so be it.


I saw no point in being aggressive, wishing to keep them ‘on-side’ as much as possible.
Again, that same day, I received a response:

:))
Im sorry to say but its not possible to have it or it take about 1 month if you try hard to have it again :)) and you lose your visitor ….hahaha
You can purchase it for 650 $ And we will use escrow sevices ;) that will done in less than 2 days !

Now my domain name was being held to ransom, and the hacker was taunting me. What I had spent more than a year building into a sound marketing plan had been severed at the knees.
I’m not the type of person who will hand any money over to a criminal, so I didn’t reply, instead focusing on stopping this hacker from stealing any more of my property.
How was I being hacked?
After a little research, I found this expos� into Google’s GMail defficiences: Google GMail E-mail Hijack Technique
It details the exact GMail hijack that I have just found applied to my account (right whilst writing this blog post).
Here’s an excerpt:

The victim visits a page while being logged into GMail. Upon execution, the page performs a multipart/form-data POST to one of the GMail interfaces and injects a filter into the victim�s filter list. In the example above, the attacker writes a filter, which simply looks for emails with attachments and forwards them to an email of their choice. This filter will automatically transfer all emails matching the rule. Keep in mind that future emails will be forwarded as well. The attack will remain present for as long as the victim has the filter within their filter list, even if the initial vulnerability, which was the cause of the injection, is fixed by Google.

And here’s a three step illustration of just how this threat works (click each image for a larger version):
GMail security threat
GMail security threat
GMail security threat
Images courtesy of GNUCITIZEN
I took a look at the ‘Filter’ option in my own GMail settings, and it turns out that you can easily set incoming emails containing specific words to be forwarded automatically. For example, if you want any emails containing the word password to be sent to another address, no problem. It also appears that the Filter can delete the email from your GMail inbox as soon as it has been forwarded, so you’d be none the wiser if a hacker was playing havoc with your incoming mail.
IMPORTANT: If you use GMail, it’s absolutely vital that you check your account settings now.
Here’s what to do:
When logged into GMail, click on the ’settings’ tab in the upper right of the screen. Then check both the ‘Filters’ and the ‘Forwarding and POP’ sections. This is what I only just found in my ‘Filters’ tab:

The following filters are applied to all incoming mail:
Matches: transfer-approval.com
Do this: Forward to ba_marame_pooli@yahoo.com, Skip Inbox, Delete it
Matches: from:(transfer-approval.com)
Do this: Forward to ba_marame_pooli@yahoo.com, Skip Inbox, Delete it


I have absolutely no idea who’s email address that is, but it seems to me that some of my personal emails were bypassing my inbox entirely, instead being forwarded to the yahoo.com address.
It appears that the GMail security issue is fixed, but that won’t remove any previously installed Filters from your GMail account.