The FBI took claims by new hacking group The WikiBoat that it was going to bring down the likes of Apple and Tesco last Friday at 4pm so seriously that it sent email warnings to those targeted. It's now Sunday morning, and the threatened DDoS attacks do not appear to have happened. So has The WikiBoat been sunk and is #OpNewSon a failure?
The answers would appear to be that it was never actually launched, but that doesn't mean that #OpNewSon is a failure or that this is the last we will hear from The WikiBoat in my opinion.

Let's look at the declaration from The WikiBoat which started the whole thing off:

"We, #TheWikiBoat would like to introduce this press release on our very first operation: Operation NewSon (OpNewSon). As previously stated, we have no motives other then doing it all for the lulz. However this operation will be slightly different and will somewhat change our already stated objective on doing it for the lulz. On the day of the operation, we plan to hit and attack several high corporate entities. Shortly after the start of the operation, we plan to release precious classified data on the already set out list of targets we do have. Those targets are none other then the ones who ultimately rule: the high revenue making companies of the world. While attacking the major companies of this planet may seem lulzy, we also wish that this operation make a difference. We are "sticking it to the man" so to speak. Our hopes are set out on this being a major operation because after all, we will be hitting major corporate/incorporate associations.

This operation has three parts to it.

1 - Spread the word of OpNewSon

This part is already in effect. We just need everyone to spread the word that a major operation is coming up real soon. The goal is for this message to get at least 5,000 views. Please spread the word of this operation in any way you can. Twitter, Facebook, YouTube, etc. Let the corporate entities know that we are coming.

2 - The online protests

This is where we need your help! Online protesting is simple and effective. All that's needed is enough people with the power to stand up to those who ultimately rule the world. We ask that you join us on the day of the 25th (May) in our IRC for further
instructions on our planned protesting.

[instructions deleted by DaniWeb]

Until then, here's how you can ready up...We're going to be DDoS'ing the targets. DDoS takes a website offline for a certain amount of time depending on how many people are participating in the attack. These easy meaningful attacks are actually quite effective and have huge impacts. The tool we will be using is called LOIC.

Download here: [URL deleted by DaniWeb]

We'll explain how to use LOIC as well as which targets we'll be hitting on the 25th of May. More information and updates will also become available on

Twitter: @AnonymousWiki @AnonymouSpoon @MehIzDanneh @TibitXimer @Anonymau

3 - The attacks

This phase will be the most powerful. By the time this phase is initiated, all targets will have been downed (DDoS'd) for at least 2 hours. This phase is all about leaking highly classified data from the targets.


Spread the word as much as possible as we plan to take on the great elite."

From this we can determine that TheWikiBoat has certainly succeeded with phase one, spreading the word about #OpNewSon and making a name for itself in the process. The online coverage in advance of the proposed attacks was plentiful, and the FBI seemed to take it very seriously indeed which gives the group added kudos. Phase two is a little more difficult to determine whether successful or not, chatter across an IRC channel is not a hugely anarchic tactic after all. That said, phase three does appear to have been a FAIL, assuming you believe that it was ever intended to be taken seriously in the first place.

I have grave doubts that it was. In fact I would go so far as to say that phase three and phase one were one and the same thing: generate as much publicity about TheWikiBoat as possible. After all, who announces details of sites that are going to be hit with a DDoS attack ahead of actually hitting them? It makes no sense at all, other than to perhaps create a sense of fear amongst those being named. All it would really accomplish is to ensure those sites, especially given the size of the ones so named, would get prepared and ensure that their defences were well and truly in place. No, I am convinced it was a publicity stunt, and as far as that goes it was far from a failure. The fact that the FBI took the step of sending out emails to warn large corporates of the risk is proof of that.

The inevitable associating of TheWikiBoat with Anonymous was probably all it took to get the attention of the FBI. Next time, I imagine that if any announcements are made they will be diversionary in nature and the real targets will be taken down without prior warning. I doubt very much that this is the last we will hear from TheWikiBoat...

Edited by happygeek: unstuck

As Editorial Director and Managing Analyst with IT Security Thing I am putting more than two decades of consulting experience into providing opinionated insight regarding the security threat landscape for IT security professionals. As an Editorial Fellow with Dennis Publishing, I bring more than two decades of writing experience across the technology industry into publications such as Alphr, IT Pro and (in good old fashioned print) PC Pro. I also write for SC Magazine UK and Infosecurity, as well as The Times and Sunday Times newspapers. Along the way I have been honoured with a Technology Journalist of the Year award, and three Information Security Journalist of the Year awards. Most humbling, though, was the Enigma Award for 'lifetime contribution to IT security journalism' bestowed on me in 2011.

6 Years
Discussion Span
Last Post by happygeek

It's called 'signature spam' where someone posts to anything just in order to expose the advertising links in their sig - we see it all the time...

Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.