As of 2018, UGNazi is now white-hat security research group who ethnically hack protected systems to assess their security level management and vulnerabilities. The majority of their members specialize in cryptocurrency exchange as a security consultant of the blockchain . The group is best known for their expertise of social-engineering that stole thousands of passwords and credit card details from billing and customer support provider WHMCS. The hacking group also had strong opposition to CISPA and SOPA and practice of Distributed Denial of Service (or DDoS) attacks against United States government websites. UGNazi short for Underground Nazi Hacktivist Group, is a computer hacker group that was formed by Josh The God in 2011.
- 1 List of attacks
- 2 Known members
- 3 Law enforcement response
- 4 Sentencing
- 5 Final status
- 6 References
- 7 External links
List of attacks
WHMCS database leak
In May 2012, UGNazi is responsible for hacking the web server of the web host billing software developer WHMCS in an apparent social engineering attack. A member of the group called WHMCS' hosting provider impersonating a senior employee. They were subsequently granted root access to WHMCS' web server after providing information for identity verification. UGNazi later leaked publicly WHMCS' SQL database, website files, and cPanel configuration. The leaked database contains about 500,000 stored credit card numbers. 
UGNazi member Next claimed that the group targeted WHMCS in response to their tolerance for fraudulent websites' licensed use of their software. Days later, Cosmo released a statement claiming that WHMCS was attacked to demonstrate the vulnerability of their customers' credit card numbers, which were stored on a web server managed by HostGator.
Washington Military Department leaks
After compromising a database belonging to the Washington Military Department, UGNazi leaked sensitive DNS information used by the US state of Washington. They also leaked the account details of about 16 users, consisting of usernames and password hashes, including those of the website's administrator. "This is just a continuation of our attack against wa.gov, but other than that, like we said we're not done with the government or anyone to be exact. We're going to come after every dirtbag we can get our hands on. Freedom is a right not a privilege but the US government makes it seems like it's a privilege that we have the 'freedom'," a group member told Softpedia.
UFC.com and fighter Dana White
UGNazi leader, Josh The God hacked the website UFC.com leaking the website's database, financial and personal information of Dana White in response for the UFC's support of SOPA. They attacked the Gamer's League Live website and Ultimate Fighting Championship's website in protest of the UFC's support for the Stop Online Piracy Act (SOPA), proposed by the United States at the time. They later hacked Coach's website for the same reason.
Softpedia published an article about the attack on the CIA. Hackers of UGNazi are launching attacks on the sites of the CIA and the one of the Department of Justice (DOJ).
In May 2012, UGNazi targeted the open source forum software, MyBB. UGNazi's Twitter account claims the attack was because the largest hacking forum on the Internet, HackForums, uses the MyBB software. The attack appears to have been done by DNS poisoning. The mybb.com domain had been edited to point toward the UGNazi website. At this time, there has been no evidence of server or data breaches.
In June 2012, UGNazi targeted the well-known imageboard 4chan. They are reported to have hacked CloudFlare's database. The attacks on 4chan were short, lasting about 20 minutes. During that 20 minutes anyone trying to access 4chan would be redirected to UGNazi's Twitter page.
Wounded Warrior Project
On June 6, 2012, UGNazi attacked the payment processor known as WePay, leaving the website unavailable for 17 hours. People[who?] claim the attack on the WePay website may have resulted in a data breach, but whether it has actually occurred is currently unknown.
On June 8, 2012, UGNazi hacked the website of Wawa, a chain of convenience stores. They defaced the webpage, and have made statements that they have remote access to all of Wawa's gas station terminals. UGNazi has said that the reason for hacking Wawa was to lower gas prices. The Wawa website has since been secured.
On June 17, 2012, UGNazi hacked the website of Six Flags Entertainment Corporation and left the page defaced for over six hours.
On June 21, 2012, UGNazi claimed they took popular social media website Twitter down via a denial of service attack. Twitter was down for two hours, and this was the worst crash the site had faced in eight months. However, "It's doubtful they wrestled down Twitter — it was probably just a bug," said blogger Sam Biddle.
Westboro Baptist Church
UGNazi hacked into the Twitter accounts of Shirley Phelps-Roper on December 17, 2012, and Fred Phelps Jr. on December 19, 2012, in protest of their Westboro Baptist Church's planned protest following the Sandy Hook Elementary School shootings. Phelps-Roper's account displayed a tribute called 'Pray For Newtown', lending support to those affected by the tragedy. As of the 20th of the same month, Phelps-Roper's account has been returned to her control, whereas Phelps' is listed as having been suspended.
Josh Leroux (JoshTheGod) from New York, USA, is the leader who created UGNazi back in 2011. He is responsible for running the websites Ugnazi.com, exposed.su,
Eric Taylor (CosmoTheGod) managed social media accounts and hid behind Twitter alias @UG.Cosmo was used as a public face for any newspaper articles and press inquiries by representing UGNazi claiming he was the one responsible for all cyber attacks.
Dillion Crawford (f0rsaken) from Santa Monica, California has been charged with computer crimes associated with a series of distributed denial of service (DDoS) attacks, stolen credit cards & selling DDoS-for-hire services.
Mr0sama (TheGodfather), originally from Hettenleidelheim, Germany launched a DDoS attack against Papa John's website after being told that "pepperoni would cost extra."
Law enforcement response
Mir Islam, allegedly UGNazi member JoshTheGod, was arrested on June 26, 2012 in Manhattan as part of Operation Card Shop, a Federal Bureau of Investigation investigation into identity theft and credit card fraud, after allegedly attempting to withdraw money using a stolen ATM card.
Cosmo, another alleged UGNazi member, was also arrested on June 26, 2012 in Long Beach, California as part of Operation Card Shop. The FBI's press release regarding Operation Card Shop states, "In addition, two minors, whose names will not be made public, were arrested by local authorities in Long Beach and Sacramento, California". Two days later, Cosmo was released from a juvenile detention center in Los Angeles and posted on Twitter, which was Cosmo's final tweet for the next two years. 
As of January 10, 2014, UGNazi has announced a return on Twitter which was retweeted by Cosmo.
On November 7, 2012, the 15-year-old UGNazi hacker known as Cosmo or Cosmo the God was sentenced in juvenile court in Long Beach, California. Cosmo pleaded guilty to multiple felonies in exchange for a probation, encompassing all the charges brought against him, which included charges based on credit card fraud, identity theft, bomb threats, and online impersonation, the terms of the plea place him on probation until his 21st birthday. During that time, he cannot use the Internet without prior consent from his parole officer. Nor will he be allowed to use the Internet in an unsupervised manner, or for any purposes other than education-related ones. He is required to hand over all of his account logins and passwords. He must disclose in writing any devices that he has access to that have the capability to connect to a network. He is prohibited from having contact with any members or associates of UGNazi or Anonymous (although Anonymous has no official members), along with a specified list of other individuals. He had to forfeit all the computers and other items seized in the raid on his home. Violating any of these terms will result in a three-year prison term.
Regardless of the loss of Cosmo, the group continued to claim responsibility for hacks in December 2012 of the U.S. State Department and General Services Administration and of Panasonic Brasil. However, they were not heard from until an August 2014 doxing of several prominent people (albeit thinly) related to the #OpFerguson protests concerning the shooting of Michael Brown in Ferguson, Missouri.
- Day, Andrea. "A former hacker reveals what he's learned about cybersecurity". CNBC.
- Kumar, Mohit. "Web Hosting Software WHMCS Vulnerable". The Hacker News.
- "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". News.softpedia.com. Retrieved August 20, 2014.
- Greenberg, Andy (May 22, 2012). "Hackers Impersonate Web Billing Firm's Staff To Spill 500,000 Users' Passwords And Credit Cards". Forbes.
- Leyden, John (May 22, 2012). "Titsup WHMCS calls the Feds after credit-card megaleak". Retrieved August 18, 2014.
- Kovacs, Edward. "UGNazi Leaks 1.7 GB of Data from WHMCS Servers". Softpedia News. Retrieved 16 September 2018.
- Kovacs, Eduard. "UGNazi Hackers Leak Data from Washington Military Department". Softpedia. Retrieved May 20, 2012.
- "The UFC finally issues a statement about UGNazi, the group that hacked UFC.com". MiddleEasy. Retrieved May 20, 2012.
- Keith Dsouza (January 24, 2012). "Coach.com Hacked, Coachfactory.com Hacked to Protest SOPA by UGNazi Group". Techie-buzz.com. Retrieved August 20, 2014.
- Serial Velocity
- "Twitter / CosmoTheGod: We have gained full access". Twitter.com. June 1, 2012. Retrieved August 20, 2014.
- Kumar, Mohit (4 June 2012). "UGNazi hackers attack on CloudFlare via a flaw in Google". Retrieved 2 February 2017.
- "UGNazi Attacks Wounded Warrior Project to Spite The Jester". News.softpedia.com. Retrieved August 20, 2014.
- "Twitter / UG: @th3j35t3r http://t.co/BfEx9nz4". Twitter.com. June 1, 2012. Retrieved August 20, 2014. External link in
- "Twitter / JoshTheGod: http://t.co/x8MgI6N7 Tango". Twitter.com. June 5, 2012. Retrieved August 20, 2014. External link in
- "Twitter / UG: https://t.co/ZOmgzhwj Tango". Twitter.com. June 5, 2012. Retrieved August 20, 2014. External link in
- "Twitter / UG: #UGNazi Wawa Hacked!, Gas". Twitter.com. June 8, 2012. Retrieved August 20, 2014.
- "Wawa's website hacked | Courier-Post". courierpostonline.com. June 8, 2012. Retrieved August 20, 2014.
- https://archive.is/20130121191416/http://digg.com/news/world_news/ugnazi_claims_to_hacked_defaced_and_be_in_control_of_wawa_servers. Archived from the original on January 21, 2013. Retrieved June 9, 2012. Missing or empty
- "In hack, Wawa web turns Kawaii Hitler". Philly.com. June 10, 2012. Retrieved August 20, 2014.
- Pepitone, Julianne (June 21, 2012). "Twitter crashes hard, Internet freaks out". CNN. Archived from the original on June 23, 2012.
- Biddle, Sam (November 30, 2012). "The Final Words of a 15-Year-Old Hacker Banned from the Internet". Gizmodo. Archived from the original on June 15, 2014.
- SINCLAIR, HARRIET (15 November 2017). "PAPA JOHN'S TELLS NAZIS 'DON'T BUY OUR PIZZA' AFTER CHAIN IS CLAIMED AS OFFICIAL PIE OF ALT-RIGHT". newsweek.com. Retrieved 11 September 2018.
- Zetter, Kim (June 26, 2012). "Feds Arrest 24 in Global Carding Ring Bust". Wired. Condé Nast Publications. Archived from the original on July 8, 2012. Retrieved July 8, 2012.
- "FBI — Manhattan U.S. Attorney and FBI Assistant Director in Charge Announce 24 Arrests in Eight Countries as Part of International Cyber Crime Takedown". Fbi.gov. June 26, 2012. Retrieved August 20, 2014.
- "Twitter / CosmoTheGod: Me and Josh were arrested early". Twitter.com. June 28, 2012. Retrieved August 20, 2014.
- , Accessed September 12th,2014.
- Honan, Mat (November 9, 2012). "Teenage Hacker 'Cosmo the God' Sentenced by California Court". Wired.
- "UGNazi Claims Hacking US Government Websites Including State Department". VARA Cyber Security. December 12, 2012. Archived from the original on June 15, 2014.
- "UGNazi Claims Hacking of Panasonic's Brazilian Website". VARA Cyber Security. December 12, 2012. Archived from the original on June 15, 2014.