Today the website of UGNAZI changed from administrator. The new administrator is the FBI, they have taken over the website after the attacks UGNAZI has done. UGNazi, also known as the Underground Nazi Hacktivist Group, is a computer hacker group that has claimed responsibility for several attacks conducted over the Internet. They are perhaps best known for their "Tango Down" DDoS attacks on United States government websitesand for leaking the personal information of government officials.
In January 2012, the UGNazi attacked the Ultimate Fighting Championship's website in protest of the UFC's support for the Stop Online Piracy Act proposed by the United States at the time.They later hacked Coach's website for the same reason
UGNazi has reportedly discovered several exploits within the Google verification and security system. As a result, they have managed to bypass the Google 2 step authentication system. They have also bypassed Google's account security recovery system. Matthew Prince, the current CEO of CloudFlare had hisGmail account hacked by UGNazi with the aforementioned exploit.
In January 2012, the UGNazi attacked the Ultimate Fighting Championship's website in protest of the UFC's support for the Stop Online Piracy Act proposed by the United States at the time.They later hacked Coach's website for the same reason,.
After compromising a database belonging to the Washington Military Department, UGNazi leaked sensitive DNS information used by the US state of Washington. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator. "This is just a continuation of our attack against wa.gov, but other than that, like we said we're not done with the government or anyone to be exact. We're going to come after every dirtbag we can get our hands on. Freedom is a right not a privilege but the US government makes it seems like it's a privilege that we have the 'freedom'," a group member told Softpedia.
In May 2012, UGNazi claimed responsibility for hacking the web server of the web host billing software developer WHMCS in an apparent social engineering attack. A member of the group called WHMCS's hosting provider impersonating a senior employee. They were subsequently granted root access to WHMCS's web server after providing information for identity verification. UGNazi later leaked publicly WHMCS's SQL database, website files, and cPanel configuration. The leaked database contains about 500,000 stored credit card numbers. The Federal Bureau of Investigation has since been involved in the ongoing investigation.
UGNazi member Cosmo claimed that the group targeted WHMCS in response to their tolerance for fraudulent websites' licensed use of their software.Days later, Cosmo released a statement claiming that WHMCS was attacked to demonstrate the vulnerability of their customers' credit card numbers, which stored on a web server managed by HostGator.
In May 2012, UGNazi targeted the open source forum software, MyBB. UGNazi's Twitter account claims the attack was because the largest hacking forum on the Internet, HackForums, uses the MyBB software. The attack appears to have been done by DNS poisoning. The mybb.com domain had been edited to point toward the UGNazi website. At this time, there has been no evidence of server or data breaches.
In June 2012, UGNazi attacked one of the world's biggest hosting companies, HostGator, leaving the website unavailable for almost 4 hours.
On June 6, 2012, UGNazi attacked the payment processor known as WePay, leaving the website unavailable for 17 hours. People claim the attack on the WePay website may have resulted in a data breach, but whether it has actually occurred is currently unknown.
On June 8, 2012 UGNazi hacked the website of Wawa, a chain of convenience stores. They defaced the webpage, and have made statements that they have remote access to all of Wawa's gas station terminals. UGNazi has said that the reason for hacking Wawa was to lower gas prices. The Wawa website has since been secured