The Jester (also known by the
leetspeak
Leet (or "1337"), also known as eleet or leetspeak, is a system of modified spellings used primarily on the Internet. It often uses character replacements in ways that play on the similarity of their glyphs via reflection or other resemblance ...
handle th3j35t3r
) is a self-identified
grey hat hacktivist
In Internet activism, hacktivism, or hactivism (a portmanteau of ''hack'' and ''activism''), is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hack ...
.
He claims to be responsible for attacks on
WikiLeaks
WikiLeaks () is an international non-profit organisation that published news leaks and classified media provided by anonymous sources. Julian Assange, an Australian Internet activist, is generally described as its founder and director and ...
and
Islamist websites.
He claims to be acting out of American patriotism.
Identity and communication
The Jester first appeared on Twitter. On June 26, 2010, he established his
WordPress
WordPress (WP or WordPress.org) is a free and open-source software, free and open-source content management system (CMS) written in PHP, hypertext preprocessor language and paired with a MySQL or MariaDB database with supported secure hypert ...
blog "Jester's Court". The Jester also communicates via his
I2P IRC channel #jester.
The Jester had stated that he was a former soldier and had served in
Afghanistan
Afghanistan, officially the Islamic Emirate of Afghanistan,; prs, امارت اسلامی افغانستان is a landlocked country located at the crossroads of Central Asia and South Asia. Referred to as the Heart of Asia, it is bord ...
and elsewhere.
A former defense operative claimed that The Jester was a former military contractor involved in
US Special Operations Command projects.
Activities
On January 1, 2010, The Jester began a campaign against
Jihadist
Jihadism is a neologism which is used in reference to "militant Islamic movements that are perceived as existentially threatening to the West" and "rooted in political Islam."Compare: Appearing earlier in the Pakistani and Indian media, Wes ...
websites. His first target was alemarah.info, which was the
Taliban
The Taliban (; ps, طالبان, ṭālibān, lit=students or 'seekers'), which also refers to itself by its state name, the Islamic Emirate of Afghanistan, is a Deobandi Islamic fundamentalist, militant Islamist, jihadist, and Pas ...
's website at the time.
The Jester posted several tweets claiming to be responsible for the downtime WikiLeaks was experiencing.
On November 29, 2010, someone claiming to be The Jester stated that he had been raided by the U.S. and attempted to solicit money for legal fees. The Jester purported that the person was an impostor, though writers at InfoSecIsland believe the hoax was created by The Jester himself.
In February, 2011, The Jester claimed credit for a DoS attack on several sites belonging to the
Westboro Baptist Church
The Westboro Baptist Church (WBC) is a small American, unaffiliated Primitive Baptist church in Topeka, Kansas, founded in 1955 by pastor Fred Phelps. Labeled a hate group, WBC is known for engaging in homophobic and anti-American pickets, ...
for celebrating the death of homosexual U.S. servicemen.
In June 2011 The Jester vowed to find and expose members of
LulzSec
LulzSec (a contraction for Lulz Security) was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed ...
.
He attempted to obtain and publish
personally identifiable information
Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person.
The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
of key members within group, whom he described as "childish".
In March 2011,
Barrett Brown said The Jester was trying to identify members of
Anonymous
Anonymous may refer to:
* Anonymity, the state of an individual's identity, or personally identifiable information, being publicly unknown
** Anonymous work, a work of art or literature that has an unnamed or unknown creator or author
* Anonym ...
with
Backtrace Security
In computing, a stack trace (also called stack backtrace or stack traceback) is a report of the active stack frames at a certain point in time during the execution of a program. When a program is run, memory is often dynamically allocated in two p ...
, a group of former members of Anonymous who disagreed with the current Anonymous. On June 24, 2011, he incorrectly claimed to have revealed the identity of LulzSec leader Sabu as an
information technology consultant possibly from
New York City
New York, often called New York City or NYC, is the most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the most densely populated major city in the U ...
. In July of the same year he falsely accused a Portuguese IT professional of also being Sabu, leaving The Jester's outing claims to be considered suspect. However, in a post on his blog in November 2011, The Jester retracted his prior identifications for "Sabu", issued an apology and correctly identified "Sabu" as Hector Xavier Monsegur, 28, of New York. Sabu's identity was confirmed on March 6, 2012, when Monsegur was arrested by the FBI and it was revealed that he had been acting as an FBI informant in the interim.
On March 5, 2012, The Jester changed his Twitter account @th3j35t3r avatar from his signature Jester icon to a
QR code
A QR code (an initialism for quick response code) is a type of Barcode#Matrix (2D) barcodes, matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso#Denso Wave, Denso Wave. A barcode is a machine-readable optic ...
without comment or explanation.
Scanning a QR code redirects a browser to a website. Scanning The Jester's icon led to a URL where he had an image of his signature Jester icon and an embedded, hidden code that allegedly exploited a vulnerability that affects
Safari
A safari (; ) is an overland journey to observe wild animals, especially in eastern or southern Africa. The so-called "Big Five" game animals of Africa – lion, leopard, rhinoceros, elephant, and Cape buffalo – particularly form an importa ...
,
Chrome
Chrome may refer to:
Materials
* Chrome plating, a process of surfacing with chromium
* Chrome alum, a chemical used in mordanting and photographic film
Computing
* Google Chrome, a web browser developed by Google
** ChromeOS, a Google Chrome- ...
and
Android
Android may refer to:
Science and technology
* Android (robot), a humanoid robot or synthetic organism designed to imitate a human
* Android (operating system), Google's mobile operating system
** Bugdroid, a Google mascot sometimes referred to ...
browsers.
"When anyone scanned the original QR code using an
iPhone or Android device, their device would silently make a
TCP
TCP may refer to:
Science and technology
* Transformer coupled plasma
* Tool Center Point, see Robot end effector
Computing
* Transmission Control Protocol, a fundamental Internet standard
* Telephony control protocol, a Bluetooth communication s ...
shell connection back to my remote server," The Jester wrote.
This was however exposed to be fake and the exploit was stolen from a 2-year-old CVE advisory.
On May 14, 2012, The Jester's Twitter account (@th3j35t3r) appeared to have been deleted, along with all posts on his WordPress blog. However, the Twitter account and WordPress blog were merely temporarily deactivated and were subsequently restored May 16, 2012.
On July 2, 2013, the Jester took responsibility for a series of DoS cyberattacks against the
Ecuador
Ecuador ( ; ; Quechuan languages, Quechua: ''Ikwayur''; Shuar language, Shuar: ''Ecuador'' or ''Ekuatur''), officially the Republic of Ecuador ( es, República del Ecuador, which literally translates as "Republic of the Equator"; Quechuan ...
ean stock exchange and the country's tourism website, and promised to attack any other governments considering granting asylum to
NSA leaker
Edward Snowden
Edward Joseph Snowden (born June 21, 1983) is an American and naturalized Russian former computer intelligence consultant who leaked highly classified information from the National Security Agency (NSA) in 2013, when he was an employee and s ...
. In tweets, the Jester also alluded to a plan to seize control of the fire alarms at the Ecuadorean embassy in
London
London is the capital and List of urban areas in the United Kingdom, largest city of England and the United Kingdom, with a population of just under 9 million. It stands on the River Thames in south-east England at the head of a estuary dow ...
, which would force WikiLeaks founder
Julian Assange
Julian Paul Assange ( ; Hawkins; born 3 July 1971) is an Australian editor, publisher, and activist who founded WikiLeaks in 2006. WikiLeaks came to international attention in 2010 when it published a series of leaks provided by U.S. Army i ...
to set foot on UK soil and face potential extradition to
Sweden to face sexual assault charges.
On October 21, 2016, the Jester took responsibility for "defacing" the official website of the Russian Ministry of Foreign Affairs. The "hack" was later shown to be fake, actually being a POST based
XSS
Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may ...
on the website, not a deface or hack.
References
*
{{DEFAULTSORT:Jester, The
Hackers
Hacktivists
Internet activists
Living people
Unidentified criminals
Unidentified people
Vigilantes
Year of birth unknown
Year of birth missing (living people)