The AnonGhost hackers are active once again, the Mauritania Attacker seems to be one of the pull horses which is pulling the AnonGhost towards aggressive hacking. This time the AnonGhost hackers claim that they have hacked the Israeli Mozilla Firefox environment.

The hackers claim to have targeted the following domains:
- community.mozilla.org.il
- archive.mozilla.org.il
- chat.mozilla.org.il
- firefox.co.il
- live.mozilla.org.il
- wiki.mozilla.org.il
- www.firefox.co.il
The claim can be found on the Pastebin website, the file contains various information which on first sight seems to be pulled from the Mozilla Firefox environment. The hackers have found a way to gain access to the databases which are titled:
- h42516_bugzilla
- h42516_drupal
- h42516_hebmoz
- h42516_mediawiki
- h42516_phpbb
- h42516_phpbb3
- h42516_portal
- h42516_staging
- h42516_wordpress

The AnonGhost hackers have been attacking Israeli domains and environments for years, and on this day they are still active. In the same pastebin file, you will be able to see that AnonGhost is already planning their attacks for 2015. The AnonGhost hackers warn that they will attack Israeli domains in #opIsrael again in 2015.

It is not the first time that AnonGhost has targeted the Mozilla community and company. In June 13, 2013 the Mozilla Director of Security Assurance Michael Coates reported that the AnonGhost hackers had gained access to activation codes and that they were not aware that the activation codes were at risk of being leaked.
A small chat with Mauritania Attacker (AnonGhost) about the hack on the official Mozilla Firefox:
Q: Why did AnonGhost target Mozilla?
This is an reminder to Mozilla again , so they can know that we are able to do it anytime.
Q: How many members of the AnonGhost team helped in the attack, and were there any other hacking teams or members helping you in the attack on Mozilla Firefox?
No team helped and no team never helped us, it’s me bro MA
Q: How much time did you needed to breach the environment
15 minutes
Q: How did you initiate the hack on the environment
I uploaded a shell via the CMS website and then bypassed the server.