Shutdown Means Darkness For Most Government Websites
The MCMC, the country's Internet and telecommunications regulator, did not however provide information on the nature of the attacks, or the people behind it, describing them only as "unknown hackers".
However, it made references to some of the websites recovering quickly, suggesting that these sites faced a DDoS or distributed denial-of-service attack rather than a hack.
DDoS attacks can make a website inaccessible to users by swamping the website with traffic from hundreds or thousands of computers.
Such attacks are a known tactic of Anonymous, a hacker group that had threatened to attack Malaysia.
The MCMC had noticed a reduction in the levels of attack by 4 a.m. local time Thursday, it said. The attacks had little effect on Malaysian users, and most of the websites have already recovered, it said.
"We do not expect the overall recovery to these websites to take long," it said.
"The public is advised to report any information they may have regarding the identity of these hackers as the act to disrupt network services is a serious offence," it said.
Anonymous has used various online forums to threaten Malaysia with an attack in protest against the government's decision to block 10 websites that reportedly allowed the download of pirated content. Earlier this week, Anonymous invited people to join Operation Malaysia, targeting a government website from 7.30 p.m. GMT on Wednesday (3.30 a.m. Thursday, local time).
List of hacked Malaysia government website (16 June 2011, 11:26am):
http://moha.gov.my/-still cannot view
http://www.malaysia.gov.my/-still cannot view
http://www.kpdnkk.gov.my/-still cannot view
http://www.sabahtourism.com/-still cannot view
http://www.eghrmis.gov.my/-still cannot view (not sure if this because of attack)
http://penang.uitm.edu.my/-OK already
http://www.tourism.gov.my/-OK already
http://www.spr.gov.my/-OK already
http://www.bomba.gov.my/-OK already
http://www.jbiotech.gov.my/-OK already
https://ezi2care.jkm.gov.my/-Can only see Hello world from WordPress.
http://www.moe.gov.my/-OK already
http://www.cidb.gov.my/-OK already
http://www.treasury.gov.my/-OK already
http://www.kkr.gov.my/-OK already
http://www.penerangan.gov.my/-slow response (maybe because of DoS attack).
http://www.1malaysia.com.my/-slow response
http://www.parlimen.gov.my/-OK already.
http://www.rmp.gov.my/-OK already.
http://jpm.gov.my/-still cannot view
http://www.mocat.gov.my/-still cannot view.
http://www.nsc.gov.my/-OK already.
http://www.mohr.gov.my/-OK already.
http://www.kjc.gov.my/-still cannot view.
http://www.malaysia.gov.my/-still cannot view
http://www.kpdnkk.gov.my/-still cannot view
http://www.sabahtourism.com/-still cannot view
http://www.eghrmis.gov.my/-still cannot view (not sure if this because of attack)
http://penang.uitm.edu.my/-OK already
http://www.tourism.gov.my/-OK already
http://www.spr.gov.my/-OK already
http://www.bomba.gov.my/-OK already
http://www.jbiotech.gov.my/-OK already
https://ezi2care.jkm.gov.my/-Can only see Hello world from WordPress.
http://www.moe.gov.my/-OK already
http://www.cidb.gov.my/-OK already
http://www.treasury.gov.my/-OK already
http://www.kkr.gov.my/-OK already
http://www.penerangan.gov.my/-slow response (maybe because of DoS attack).
http://www.1malaysia.com.my/-slow response
http://www.parlimen.gov.my/-OK already.
http://www.rmp.gov.my/-OK already.
http://jpm.gov.my/-still cannot view
http://www.mocat.gov.my/-still cannot view.
http://www.nsc.gov.my/-OK already.
http://www.mohr.gov.my/-OK already.
http://www.kjc.gov.my/-still cannot view.
They’re also exposing 392 account details in Sabah Tourism site from over 3400 users. The data that posted online were email, addresses and passwords. It was defaced with words that include “Deface by Kambeng Merah: Credit to DarkJawa”.

Refer to the exhibit. A technician applies the configuration in the exhibit to a clean router. To verify the configuration, the technician issues the show running-config command in the CLI session with the router. What lines should the technician expect to see in the router output from the show running-config command?
Refer to the exhibit. A network administrator on HostA has problems accessing the FTP server. Layer three connectivity testing was successful from HostA to the S1 interface of RouterB. Which set of commands will allow the network administrator to telnet to RouterB and run debug commands?
The connection between routers B and C has been successfully tested. However, after rebooting router C, the administrator noticed the response time between networks 10.10.3.0 and 10.10.4.0 is slower. Ping between the two routers is successful. A trace route indicates three hops from router B to router C. What else can be done to troubleshoot the problem?
The serial connection shown in the graphic needs to be configured. Which configuration commands must be made on the Sydney router to establish connectivity with the Melbourne site? (Choose three.)
Refer to the exhibit. The output is shown for the show ip route command executed on Router A. What does the IP address 192.168.2.2 represent?
Refer to the exhibit. What additional command is required to allow remote access to this switch from hosts outside the local network?
Refer to the exhibit. Which names correctly identify the CLI mode represented by the prompt for Switch-East4#? (Choose two.)
Refer to the exhibit. What command will place the router into the correct mode to configure an appropriate interface to connect to a LAN?


Refer to the exhibit. A student is responsible for the IP addressing, configuration and connectivity testing of the network shown in the graphic. A ping from host B to host C results in a destination unreachable but a ping from host B to host A was successful. What two reasons could account for this failure based on the graphic and partial router output for the Dallas router? (Choose two.)
Refer to the exhibit. A student working in the lab selects a cable that is wired as shown. Which connection types can successfully be made with this cable? (Choose two.)
Refer to the exhibit. What destination IP address will PC1 place in the header for a packet destined for PC2?
Refer to the exhibit. Based on the IP configuration shown, what would be the result of Host A and Host B attempting to communicate outside the network segment?
Refer to the exhibit. How many subnets are required to support the network that is shown?
Refer to the exhibit. A student is setting up a home network primarily used for extensive file transfers, streaming video, and gaming. Which network device is best suited to these types of activities in the topology shown?
Refer to the exhibit. A network administrator has decided to use packet capture software to evaluate all traffic from the student subnet on the way to the Internet. To ensure that all packets are captured, what network device should be used to connect the monitoring station to the network between R1 and R2?
Refer to the exhibit. Assume that all devices are using default settings. How many subnets are required to address the topology that is shown?
Refer to the exhibit. Which three statements are true about the exhibited topology? (Choose three.)
Refer to the exhibit. Which three statements identify the type of cabling that would be used in the segments that are shown? (Choose three.)
Refer to the exhibit. A network technician has been allocated the 192.168.1.0/24 private IP address range for use in the network that shown in the exhibit. Which subnet mask would be used to meet the host requirements for segment A of this internetwork?