Backbox Linux Releases Update To Version 6.0

While I was away last month I got an interesting email/request by Backbox Linux Community Staff to release an article covering the release of their latest version; upgraded to version 6.0. Before getting into that however, for those of you whom might be unfamiliar with the product, Backbox Linux is an increasingly popular ethical hacking and penetration testing Linux distro – complete with all of the most modern tools and programs utilized by professionals working in these fields. In fact, Backbox Linux made Rogue Security Labs list of the most popular/widely used hacking-based Operating Systems earlier this year after receiving a review of it from “Al1ne3737” – formerly of “Pryzraky.

Learn More About Backbox & Other Hacking OS’s:

But, without any further adieu, here is everything you need to know about Backbox Linux‘s update to version 6.0, along with everything that’s new and where you can go to download the latest version.

About Backbox Linux

BackBox Linux is a penetration testing and security assessment oriented Linux distribution providing a network and systems analysis toolkit. It includes some of the most commonly known/used security and analysis tools, aiming for a wide spread of goals, ranging from web application analysis to network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, automotive and exploitation. It has been built on Ubuntu core system yet fully customized, designed to be one of the best Penetration testing and security distribution and more.

About The Update

As usual, this major release includes many updates. These include new kernel, updated tools and some structural changes with a focus on maintaining stability and compatibility with Ubuntu 18.04 LTS.

What’s New:

  • Updated Linux Kernel 4.18
  • Updated desktop environment
  • Updated hacking tools
  • Updated ISO Hybrid with UEFI support

System Requirements:

  • 32-bit or 64-bit processor
  • 1024 MB of system memory (RAM)
  • 10 GB of disk space for installation
  • Graphics card capable of 800×600 resolution
  • DVD-ROM drive or USB port (3 GB)

The ISO images for both 32bit & 64bit can be downloaded from the official web site download section.

Download Latest Version Here:

Pryzraky Hackers Responsible for 39 International Hacks, Leaks & DDoS Attacks Over The Last 4 Days

Dating back to the weekend, “Pryzraky” hackers have been extremely active in a number of hacks, leaks and DDoS attacks targeting Government institutions in and around Europe, United States, United Kingdom and South America. However, while their hacks have primarily been carried out under the banners of #OpAssange, #OpEcuador and #OpUK, Pryzraky is doing as much as possible to distance themselves from the Anonymous hacker collective, whom been extremely active in publicizing these operations online.

All told, group members “Mecz1nho Markov” (@Mecz1nho), “Alne3737” (@Al1ne3737) and “PopTart” are responsible for a 39 cyber attacks over the last 4 days, including attacks targeting the Association of Police Investigators (Brasil), International Police (France), Department of Defense (USA) and National Police Association of the United Kingdom – with some attack bringing websites down for days at a time. A full list of their attacks is chronicled below.


Association of Civilian Police Investigators: hxxp://
Faculdade Integrada Tiradentes: hxxp://
Data Download:

[Target]: hxxps://

DDoS Attacks:

International Police (INTERPOL) – hxxp:// (Tango Down’d)
US Department of Defense (DoD) – hxxp:// (Tango Down’d)
UK National Police – hxxp:// (Tango Down’d)
Supreme Court of The United Kingdom – hxxp:// (Tango Down’d)

SQLi Injection Vulnerabilities:





#FreeAssange: Attacks Against Ecuadorian Infrastructure Carry On Into The Weekend

No photo description available.

On April 12th 2019, in what would go on to become one of my most read articles in weeks, Rogue Media Labs documented a string of ongoing cyber attacks targeting the Government of Ecuador and Ecuadorian infrastructure worldwide. However, as it would turn out, these attacks weren’t just limited to the 11th and 12th, but have instead evolved into something greater – with even larger and more pronounced attacks occurring throughout the course of the weekend. The attacks themselves are now being carried out under the banners of “Operation Ecuador” (#OpEcuador) and “Operation Assange” (#OpAssange), with promises to continue the attacks well into the foreseeable future.

I’ve done my best to document most of them, but I am certain I did not catch them all. If you would like to learn more, you are invited to follow the operations hashtags on Twitter as they are featured above.

Learn More About Last Weeks Attacks:

CYB3R C0V3N S3CURITY (@Cyb3rC0v3nSec):

Superior Educational Consultants: hxxp:// (Tango Down’d)
Ecuadorian Consulate of Los Angels: hxxp:// (Tango Down’d)
Ecuadorian Consulate of Chicago: hxxp:// (Tango Down’d)
Ecuadorian Embassy of Malaysia: hxxp:// (Tango Down’d)
Ecuadorian Consulate of Houston: hxxp:// (Tango Downd)
Ecuadorian Embassy of Venezuela: hxxp:// (Tango Down’d)

Iznaye Cyber Team (@Iznaye):

Secretary of Environment: hxxp:// (Tango Down’d)
Ecuadorian Council of The Judiciary: hxxp:// (Tango Down’d)
Municipal GAD of Latacunga: hxxp:// (Tango Down’d)
Colegio Jimirwin: hxxp:// (Hacked)
Ombudsman of Ecuador: hxxp:// (Hacked/Leaked)
Universidad Técnica del Norte: hxxp:// (Hacked/Leaked)

Tapi Combat Educational Unit: hxxp://
Data Leak:

Fiscomisional Educational Unit of San Jose: hxxp://
Data Leak:

Educational University of Hispanic Americans: hxxp://
Data Leak:

Municipal del Cantón Sucúa: hxxp://
Deface Mirror:

Target: hxxp://
BombersValencia Leak:

Target: hxxp://

Pryzraky (@Pryzraky):

Ecuadorian Embassy of The United Kingdom: hxxp:// (Tango Down’d)

Ecuadorian Military Intelligence: hxxps://
Ecuadorian Internal Revenue Service: hxxp://
Cooperative CREA: hxxp://

Empresa Eléctrica Regional del Sur: hxxps://
Database Leak:


Ecuadorian National Police: hxxp:// (Deface)
Ecuadorian Embassy of Ukraine: hxxp:// (Defaced)
Central Bank of Ecuador: hxxp:// (Tango Down’d)

FBI Mail Servers:
CF-RAY: 4c751ebe4e98a875-CDG

Broadcast IP’s : (Leaked)

Liceo Military: hxxp:// (Defaced)

Ecuadorian University Leaks:

Ecuador’s School of the Judicial Function: hxxps://
Data Leak:
Leak Backup:

#OpEcuador Hit List:

And perhaps most importantly of all, I know it’s the burning question on everyone’s mind, but have no fears, Julian Assange’s cat is indeed safe!

Hacktivists Team Up To Hack, Deface, Leak or Crash 39 Ecuadorian Websites Within First 24 Hours After Assange’s Arrest

At this point it should go without saying, but yesterday morning the Ecuadorian Embassy  in London decided against continuing Julian Assange’s protection/asylum and he is now going to be extradited to stand trial in the United States – where he faces life in prison. While every news outlet between here and the moon has already done their own spinoff story on these developments, what I haven’t seen anyone else covering is the response from at least some of the hacking/cyber security community – so this is what I will attempt to do here today.

First off, the very reason why Wikileaks founder was arrested yesterday was most likely for his open support for a number of leaked documents implicating Ecuador’s President recently – likely leaked for his decision to put so much pressure on Julian Assange in the first place over recent weeks. The leaked cache of documents in question is officially referred to as the INA Papers – which you can browse in their entirety below.

Browse INA Papers Leak:

With that established, within the first 24 hours of Assange’s arrest different hackers from all around the world appear to have teamed up together to launch a massive and coordinated series of cyber attacks against the Ecuadorian Government and its infrastructure. While it would be impossible to find them all, here is everything I was able to research – 39 different targets of hacks, leaks, defaces and/or DDoS attacks April 11th-12th 2019. Among the participants were Anonymous, LulzSec, Pryzraky, CYB3R C0V3N and many more.


Target: hxxps://

Target: hxxp://
Deface Mirror:

Target: hxxp://

Tango Downed:

Ecuadorian Embassy of the United Kingdom: hxxp://
Ecuadorian Consulate of Chicago: hxxp://
Official Guide of Protocols & Procedures of the State of Ecuador: hxxp://
National Institute of Investigation: hxxp://

Targets w/ SQLi Vulnerabilities:

Press Releases:


More Information:

NASA’s Chandra X-Ray Observatory, UAE’s Sharaj Exports Development Center & Mackenzie Presbyterian Institute of Brasil Hacked by Al1ne3737 of Pryzraky

Last night, April 8th 2019, “Al1ne3737” of “Pryzraky” announced a hack/leak associated with 3 different international organizations – NASA’s Chandra X-Ray Observatory in the United States, the Sharaj Exports Development Center in the United Arab Emirates and Mackenzie Presbyterian Institute of Brasil. While leaks effecting the USA and UAE were simply limited to the names and passwords of site administrators, granting access to the back-end of the websites, the leak of the Mackenzie Institute was significant – literally over 1 Megabyte (MB) of data contained within a text file.

The file itself contains the names, emails, cell phone numbers, accounts and passwords of countless thousands of individuals – one of the largest text files I have seen in the last half year of online leaks. The file itself is contained below, and is certified safe to the public.


NASA Chandra X-Ray Observatory: hxxp://
Sharaj Exports Development Center: hxxp://
Mackenzie Presbyterian Institute: hxxp://

Data Download (1.72 MB):

Associação Nacional do Auditores Fiscais, Conselho Federal de Estatistica & SigProJ Administration of Brasil Hacked by Pryzraky

Yesterday, April 4th 2019, “Al1ne3737” of “Pryzraky” announced a hack of 4 Government agencies, organizations and websites across Brasil, leaking sensitive information tied to their databases online. More specifically implicated in the hacks/leaks were the SigProJ Administration, National Association of Tax Auditors (ANFIP), the online web portal of the 8th Region of Brasil (Pará and Amapá), as well as the Federal Council of Statistics (CONFE).

The leaks are significant, exposing information such as CPF numbers, telephone numbers, email addresses, psychical addresses, usernames and passwords of literally tens of thousands government employees and registered users. However, while the entirety of all the file folders contained within the leak add up to tens of thousands, due to file/time constraints, Al1ne3737only” released a couple thousand records to the general public. You can find all of these and more via the leaks provided below. Please note that all of the downloads are safe to the public – enjoy!

Target: hxxp://

Associação Nacional do Auditores Fiscais da Receita Federal do Brasil: hxxp://
Portal do TRT 8ª Região – Pará e Amapá: hxxp://
Database Download (688.79 KB):

Conselho Nacional de Justiça Wholly Pwned by Al1ne3737 – 94 Site Databases, 53,270 Individuals Compromised by The Data Breach

In the early morning hours of April 1st 2019, “Al1ne3737” of the international hacking group known as “Pryzraky” announced a hack and data leak effecting the National Council of Justice (CNJ) of Brasil. While the leak itself was only hosted online for a short period of time, it was substantial. For example, the leak contains personally identifiable information, including logins, of approximately 2,936 people stolen across 94 site databases. This information includes state officials, government personnel members, judges, magistrates – et cetera. In a message attached to the leak, Al1ne3737 simply stated “F*ck Brasil!

It is also important to understand that this was also only a sample of the leak mind you, the entirety of the full raw leak contains personally identifiable information, including logins, of approximately 53,270 individuals in total. Due to file size limits however, Al1ne373 only decided to release 2,936 of them to the public – keeping the rest to herself. Included in the leak was sensitive information including full names, user names, physical mailing addresses, email addresses, telephone numbers, national CPF numbers, passwords and much more. You can see a break down of some of the most important folders contained within the leak below.

Highlights from Leak:

306 entries from the usario Folder of the SGT Database- including their full names, emails, login user names and passwords
256 entries from the usario Folder of the ADOCAO Database – of 8,529 total- including full names, login user names and their passwords
66 entries from the user_web_service Folder of the BNPR Database – including organization ID numbers and passwords
256 entries from the sag_usario Table in the CNCA Database – from 13,537 total- including full names, login email addresses and passwords
256 entries from the usario table of the comparilhado Database – from 12,967 total – including user name, login names, passwords and CPF numbers
15 entries from the usario Folder of the boletim_servico Database – including full names, email addresses, passwords, CPF numbers and IP Addresses
51 entries from the usario Folder of the CAPG Database – including user code numbers and passwords
241 entries from the paciente Folder of the CADNT Database – including full names, CPF numbers, email, telephone numbers, Addresses and CEP numbers
4 entries from the usario Folder of the contatos_cnj Database – including their usernames and passwords
256 from the usario Folder of the Corporative Database – from 11,972 total – including CPF numbers, user numbers, full names, user names and passwords
4 entries from the usario Folder of the infojuris_i2 Database – including first names, user names and passwords
46 entries from the intra_users Folder of the Intranet2016 Database – including names, emails, user names and passwords
8 entries from the lime_users Folder of the LimeSurvey Database – including full names, emails, user names and passwords
79 entries from the kdali_users Folder of the NoveIntranet Database – including names, emails, usernames and passwords
3 entries from the cx0pf_users Folder of the observatorionacional Database – including name, email, usernames and passwords
256 entries from the juscnj_users Folder of the portalcnj2017 Database – out of 383 total – including names, emails, usernames and passwords
162 entries from the usario Folder of the SAPRS Database – including  full names, CPF numbers, emails, usernames and passwords
– The administrator login username, email and password for the WikiDB Database
64 entries from the wikipjeuser from the WikiDB Database – including email addresses, user names and passwords
256 entries from the login Folder of the sistemaemprego Database – of 2,073 total including login user numbers and passwords
256 entries from the usario Folder of the SEI Database – out of 816 total – including names and user information
154 entries from the usario Folder of the processometro Database – including user names, CPF numbers, email addresses, telephone numbers and passwords
256 entries from the usario_sgq Folder of the SGQ Database – including usernames, emails and CPF numbers

Alvo: hxxp://

** EDITOR’s NOTE: Al1n3737 has asked Rogue Media Labs to remove the File from the CLearNet as to make the job of any would be investigators harder. So I have complied 😉 **

#OpSudan: International Hackers Continue Onslaught Against al-Bashir & Government of Sudan

Largely led by the efforts “Lorian Synaro,” hackers from all across the world continue to come together to launch onslaught after onslaught against Omar al-Bashir and the Government of Sudan, this time crashing, hacking, defacing and/or leaking the contents of 24 websites across Sudan – all within the course of the last week alone, that I am even aware of! Their efforts all come in conjunction with “Operation Sudan” (#OpSudan), perhaps one of the single largest and most successful international cyber operations of the last decade.

Learn More – #OpSudan:

As for all of hackers behind this weeks attacks, there are many. Including, but perhaps not limited to DemonSad, Tiosan and Angel Cracking of “NewSec Group,D3xter, Al1ne3737, Ergo Hacker and Mecz1nho Markov of “Pryzraky,Lorian Synaro and System D of “Anonymous,” as well as an independant hacker known as _W4rl0ck. My apologies to anyone whom may have been left off the list! Until next time 😉


Mashreq University: hxxp://
Leak Backup:

Sudan Specialized Medical Insurance Company: hxxp://
Leak Backup:

Sudania 24 Television: hxxp://
Data Download:

جامعة القضارف : hxxp://
Elrazi University: hxxp://
File Download:

Tango Down’ed via DDoS:

The Bank Of Khartoum: hxxp://
Khartoum Police: hxxp://
Khartoum International Airport: hxxp://
Sudan Council of Ministers: hxxp://
Military Industry Corporation of Sudan: hxxp://
National Medicinal Plant Board: hxxp://
Ashorooq News: hxxp://
Almeghar News: hxxp://
Presidency of Sudan: hxxp://

Target Reconnaissance via JTSec:



The Murtada Maaz Consultancy – Contractor for NCC and Government Buildings.

Website: hxxp://


Image may contain: outdoor and text

Sudanese Ministry of Investment, Industry and Tourism.

Website: hxxp://


Image may contain: text

Elobeid Refinery Company (ORC)

Website: hxxp://


Image may contain: text

8 Government Agencies Across Colombia Hacked, Thousands of Contractors, Users, Administrators, Employees & Personnel Exposed in Data Breaches

I’ve told different hackers and hacking groups in the past that I want to see them leave their hands off Colombia, but I cant control them anymore than I can control the news now can I? To this effect, throughout the course of the day Tuesday, March 19th 2019, “Al1ne3737” of “Pryzraky” announced a new round of hacks and leaks – this time effecting the six Government agencies across Colombia. More specifically implicated in today’s release were Colombia’s Secretary of Education, Observatory of Interinstitutional Environmental Agendas, Municipal Council of San Jose de Cúcuta, the Developmental Department of Planning of Tolima, Hospital of San Rafael de Tunja and ESE Moreno y Clavijo.

The most significant of the data breaches implicated the first round of leaks was the Secretary of Education, exposing the names, login and passwords of 313 global users, along with access to the emails of 517 users. The website was also defaced with Alne3737‘s cover photo and a repeating sentence reading “Hacked by @Al1ne3737.” Meanwhile, the logins of the primary administrator of the Observatory of Interinstitutional Environmental Agendas was also exposed in the data breach, as was the logins of 46 other users and access to the personal emails of 48 more – including government employees. Lastly, the hack of the Municipal Council of San Jose de Cúcutam revealed the logins of 2 site administrators, granting full access to the pages back-end.

Targets Round 1:

SedTolima: hxxps://
Observatorio de Agendas Interinstitucionales Ambientales – CAR: hxxp://
Corporación Concejo Municipal De San Jose de Cúcucta: hxxp://

Deface Location:
Deface Mirror:
Original Leak:
Leak Backup:

The most significant data breach of the evening hours effected the Developmental Department of Planning of Tolima, exposing the login username and passwords of 171 politicians. As of the early morning hours of March 20th 2019, the website belonging to the Department of Tolima has been shut down and remains offline, presumably “for repairs” – lol. Additionally, the login user names and joint passwords of 256 contractors of the Hospital San Rafael de Tunja were also exposed by the data breach, trimmed from a larger table of 758 contractors. Lastly, the hack/leak of ESE Moreno y Clavijo exposed the login usernames and passwords of 9 site administrators.

Serving as proof of how she gained access to each of the websites, Alne3737 also released the SQL Injection (SQLi) points of vulnerability attached to each website – as well as the SQLi point of vulnerability of two additional website not named in the leaks. As for why the hacks were pulled off or why she decided to hack Colombia here today, Al1ne3737 said she did it as a favor for a friend – lol. In a message accompanying each leak, Al1n3737 also left behind a message translated from Indonesian reading “A child will be born today and grow old with no conception of privacy. They will never know what it means to have a private moment to themselves, or thoughts which aren’t registered and analyzed. And this is a problem because privacy is important; privacy and peace of mind is what we all need to determine who we are and who we want to be.

Targets Round 2:

Ejecutor Tolima: hxxp://
Hospital San Rafael de Tunja: hxxp://
ESE Moreno y Clavijo: hxxp://

Additional SQLi Target 1: hxxps://
Additional SQLi Target 2: hxxps://

Leak Backup:

Screen Shot of Defaces:

Image may contain: 1 person

Image may contain: text

#OpCatalonia: 10 Websites Across Spain Hacked, Defaced and/or Leaked by Al1ne3737 of Pryzraky

In solidaridad with #OpCatalonia and the ongoing Supreme Court trials of political dissidents being held at the hands of Spanish authorities, “Al1ne3737” of “Pryzraky” unleashed a massive round of hacks, leaks and defaces targeting various businesses and organizations around Spain. More specifically, Al1ne3737 announced a data leak effecting FAIN Elevators in Spain, along with the websites of Astigarraga Kit Line, a high end Spanish furniture retailer, Flins & Piniculas, a online digital media retailer, as well as Dragados S.A., an international business conglomerate basing their operations out of Spain. Al1ne3737 also released the SQLi points of failure of 6 additional websites, offering to give the website owners consultation to patch their vulnerabilities with the release – lulz.

Stepping a bit outside their norm, Al1ne3737 also defaced several of the websites and released a message in Indonesian attached to the leaks reading: “A child will be born today and grow old with no conception of privacy. They will never know what it means to have a private moment to themselves, or thoughts which aren’t registered and analyzed. And this is a problem because privacy is important; privacy and peace of mind is what we all need to determine who we are and who we want to be.

Targets via Data Breach:

FAIN FRANCE: hxxps://
Astigarraga kit line:
Flins y Piniculas: hxxp://
Dragados S.A: hxxps://

Deface Mirror:
Leak Backup:

Screen Shot of Deface:

No photo description available.

Additional SQLi Target Locations:

4 Argentinian Business Hacked/Leaked by Al1ne3737 of Pryzraky, SQLi Vulnerabilities of 12 More Dumped Online

Earlier this week, March 13th 2019, “Al1ne3737” of “Pryzraky” unleashed a massive string of hacks and leaks effecting website across Argentina. Included in a data leak effecting 4 corporations was the Aeronavegantes, an Argentinian travel booking agency, the Argentine Agency of Investments and International Trade, Ojo Ciudadano, an Argentinian website offering security advice to online customers, businesses and consumers, as well as the Center of Language Studies.

At the present moment in time it is not necessarily known what first motivated the attacks, though if I had a guess it would be a result of the fact that Al1ne3737 hates the country and was just bored. The hacks also add to a separate attack launched against the country by Al1ne3737 just last week, an attack which saw a hack/leak effecting the countries Secretary of Tourism and Government of Labrida – among others.

Websites Targeted via Data Breach:

Agencia Argentina de Inversiones y Comercio Internacional: hxxp://
Ojo Ciudadano: hxxp://
Asociación de Centros de Idiomas: hxxp://

Database Leak:
Data Backup:
Data Download:


#OpNicaragua: Costa Rican Foreign Ministry & Government of Nicaragua Come Under Heavy Fire from International Hackers

Dating back to March 9th 2019, over the course of the last several days a host of Nicaraguan websites and government agencies have been targeted via cyber attack. The attacks themselves are being carried out on behalf of “Operation Nicaragua” (#OpNicaragua), an international hacking campaign against President Daniel Ortega, raising awareness on behalf of his countless human rights violations against students, activists and political protesters alike.

Learn More About The Situation In Nicaragua:

As was reported by Defcon Labs on March 10th 2019, an unknown group of hackers working under the flag of #OpNicaragua announced a massive hack of the Foreign Ministry of Costa Rica, leaking personally identifiable information on over 730 Government officials online. However, it must be noted that despite the fact that the attack targeted Costa Rica, in a massage attached to the leak the hackers stated “Sorry Costa Rica for using your platform for this (we promise not to damage anything or compromise your government’s sensitive information), but this is an AID message! by the prisoners that Daniel Ortega kidnaps and tortures every day. Nothing is normal in Nicaragua.

Foreign Ministry of Costa Rica:

Target: hxxp://

Intranet: hxxp://
WebService: hxxp://
Backend: hxxps://

Data Download:

This came in addition to two hacks and leaks posted by “Al1ne3737” of “Pryzraky,” whom managed to exploit the National University of Engineering in Nicaragua and Mayors Office of Somoto, exposing the names, emails, telephone numbers and student identification numbers belonging to 131 students, along with the root login information of three site administrators of the mayors office respectably.

UNI – Recinto Augusto C. Sandino: hxxp://

Alcaldía de Somoto: hxxp://

This also can in addition to a string of DDoS attacks launched by Anonymous hackers effecting the websites of Nicaragua’s National Police and Viva Nicaragua – Television Channel 13.

Targeted via DDoS Attack:

Policía Nacional: hxxp://
Viva Nicaragua Canal 13: hxxp://

We Nicaraguans are kidnapped by a murderous and terrorist government.

Protests against the government began on April 18, 2018 by a group of university students, however peasants and different sectors have protested against the government since 2010. because the way of governing Daniel Ortega (president) and Rosario Murillo (his wife and vice-president) it is merely authoritarian and since 2007 which governs Nicaragua does not allow people make manifestation, people who have tried, are now dead.

Now there are more than 600 people killed by the Nicaraguan police, by orders of the president. Among them, children 10 months of age, students, university students, women, and adults.

More than 1200 young university students kidnapped, and more than 2,500 missing persons that police probably killed them. In Nicaragua there is no normality, it is a crime to carry a blue and white flag in your hand, they criminalize you and the government accuses you of terrorist you are imprisoned, and if you are a woman you are raped up to 10 policemen.

Anonymous Nicaragua (@AnonNic on Twitter and #OpNicargua our hashtag) has been protesting since April 19 of 2018. We can not stop because we have a commitment of solidarity with our brothers and family. Attacking the government we show him that citizen struggle does not stop, more than eighty percent of Nicaraguans do not recognize him as president.

We urge a change of government, the civic struggle has been without weapons, just protesting in the streets, with a flag in our hands. We do not want war, nor more deaths, we suffer a lot in our country, we urge that the president be tried for crimes against humanity.

We need to attack government systems, not allow them to work, until they stop killing and leave, because they are not our rulers.

Government Media, full of lies and news manipulation
Medios del gobierno, llenos de mentiras y manipulación de noticias.

Lastly, Anonymous hackers left the following list of online websites they would like to see targeted via Operation Nicaragua…..

Government sites
Sitios del Gobierno