Memehacks

| | Comments (0)

Hackers are not only harnessing the power of memes in a big way, they are (in some cases) having their creations dictated to them by whatever the passing fad happens to be at the time. A pretty strange turnaround, but it's all down to the popularity of various warring factions on the web that are increasingly attracting a hacking community. Witness the rise of Anonymous, Project Chanology and a host of others, many of whom "borrow" Memes from sites such as 4Chan, then argue over who created what meme first.

Well, read on to see an example of a DDoS tool riddled with memes just so it'll gain acceptance from the target audience (complete with built in radio and chat functionality, just to keep the "Partyvan" mentality going a little longer) after the jump. By the way, there's no getting around this - many Internet memes are (by their very nature) cruel, vile and offensive. This makes the nature of explaining some of these memes slightly tricky, and (as this is a safe for work blog) kind of makes it difficult to link to source material without making you go blind. As such, anything that might cause you boss to yell at you has been labeled not safe for work. And with that out of the way....

mhack0.jpg

Above is a perfect example of the way in which very specific demands are now being placed on the creators of hacking / cracking tools. If you want to be accepted, you have to stuff your program full of Memes. Otherwise, nobody wants it and you have a large plate of Epic Fail on your hands.

mhack1.jpg

...as you might have guessed, we're looking at a Beta release here! Fire the program up, and you're presented with the following:

mhack2.jpg

Even before you see the program, you're deluged with a mashup of Memes - namely Mudkips (WARNING - probably not safe for work), and Laz0rs. Then the program kicks into life, and the meme-fest continues:

mhack3.jpg

Packets sent are pre-filled as Loldongs (click here for the origin - again, possibly not work safe) and there's some text that says "Mudkips I choose you". Interestingly, clicking the text causes this error - perhaps the creator intended a Mudkip to appear on your desktop or something and never got round to finishing it off.

Things get even weirder at this point - remember, this is supposed to be a DDoS tool. And yet it not only has a proxy built in, but also has a radio AND chatroom functionality:

http://blog.spywareguide.com/upload/2008/05/mhack4-thumb.jpg
Click to Enlarge

Communal DDoS attacks, gotta' love it. Sort of.

What caused the creation of this particular tool though? Well, let's leave it to the creator to explain...

mhack00.jpg

....and, now that it makes no sense whatsoever, allow me to fill in the gaps.

This is Longcat. This is Longcat doing battle with Tacgnol. Longcat is looooooooong. Longcat is an extremely well known and popular meme, and certain segments of Anonymous seemingly get a little annoyed when people start using him for their own ends. From the Partyvan Wiki:

"Meme theft is the only way to sucsessfully troll Anonymous. One of the most typical types of meme theft is when a meme (especially a well-known meme) is made into an item that is sold for money, virtual or actual. The response of Anonymous to meme theft are raids that are godly and usually result in the destruction of the website."

One site, Subeta.org, found this out the hard way when they offered up Longcat as a "virtual item" on their website. You can read about what happened here - once again, not safe for work.

Well, it appears another website, GaiaOnline, is offering up Lolcat scarves to their users. This has now set in motion the Second Longcat Crusade, and also caused a wave of hack tool creators to offer up their DDoS tools to "aid the cause". Ironically, none of these tools will likely be used as Anonymous members have already realised that attempting to DDoS GaiaOnline will not work. As one person put it:

"DDoS attacks don't work on Gaia, due to the fact that they have over 20 dedicated servers that host their forums. If we want to do any serious damage to this site, we're gonna have to come up with a new method of attack. Subeta was only defeated when we achieved Keith Kurson's credit card numbers and ordered thousands upon thousands of Fresh Prince of Bel-Air boxed sets with them. Let's try doing something like that."

The Internet, Kids. It's Serious Business. For more on the Second Longcat Crusade, click here. It's possibly not safe for work either, but then that's no real surprise anyway, right?

Leave a comment

About this Entry

This page contains a single entry by Christopher Boyd published on May 6, 2008 2:15 PM.

It's A Trap! was the previous entry in this blog.

Comments Working (Again!) is the next entry in this blog.

Find recent content on the main index or look in the archives to find all content.