Mach Investigates || Hacking and Common Sense


KLONDIKE, CPAC HQ, Mach’s Office, Fish and computer Chips – Club Penguin Armies, a place where children and teens come together to simulate war “strategically” using a childhood game, in which you “waddle around and meet new friends”. You’d think that this place would be the last place for hacking of such intensity would occur. Before I begin, this post won’t be talking about DDOSing as that is NOT hacking. If you want to know what they are, look it up. Read onward to see some information that everyone should be in the loop of.

With the recent RATings being performed by siblings in crime, Jessie and Qwerty, there have been recent annoyances for CP Army members. Before I dive into specifics, I will be giving you the definition of Hacker, according to Merriam-Webster.

I even circled the important details for you!

So after reading this, you will now have the understanding that hacking is using a computer system to either gain information or cause damage. The act of hacking is also illegal, which means against the law. As of late, hacking for the purpose to deface websites and access profile information for accounts has occurred. We all know this, and we even have the evidence to prove this. Enough information infact, that if you are willing to take a few minutes of your time, provide information to the Internet Crime Complaints Government Organization, or you can type into your search bar. You can also contact your local police department, or file a notice to the Federal Bureau of Investigation. But now, I will be describing the specific hacking being performed.

As defined in “Ice Warriors Site Defaced“…

A remote administration tool (a RAT) is a piece of software that allows a remote “operator” to control a system as if he has physical access to that system. While desktop sharing and remote administration have many legal uses, “RAT” software is usually associated with criminal or malicious activity. Malicious RAT software is typically installed without the victim’s knowledge, often as payload of a Trojan horse, and will try to hide its operation from the victim and from security software. 

The operator controls the RAT through a network connection. Such tools provide an operator the following capabilities:

  • Screen/camera capture or image control
  • File management (download/upload/execute/etc.)
  • Shell control (from command prompt)
  • Computer control (power off/on/log off if remote feature is supported)
  • Registry management (query/add/delete/modify)
  • Hardware Destroyer (overclocker)
  • Other software product-specific functions

Its primary function is for one computer operator to gain access to remote PCs. One computer will run the “client” software application, while the other computer(s) operate as the “host(s)”.

Simply meaning, its a program that is force-downloaded on your computer, and when installed, the person who created the program can access control over your computer. An example is if you ever contacted your ISP, and the representative asked for control of your computer, and after you give consent, they can click on anything, and type in anything, even if they are in India. This is what a RAT is, the only difference is that it is without consent, and is used to purposely inflict damage in some way, shape, or form.

On the post which I stated above, I made a comment with advice on how to deal with and prevent these issues, which I have screenshot, and will insert into the post directly under this statement.

Now, I would like to talk a little bit about common sense. Whenever someone you don’t know wants personal information from you or posts a suspicious link in the chat room, what is your response? If you give you personal information and/or click the link without checking carefully, you are at risk. If you don’t give any personal information and search the domain of the link, then you’re doing it right! These are just basic aspects of common sense. Know what you are doing at all times.

To conclude this post, I would like to warn you all to avoid any and all links given to you by Jessie and Qwerty, and avoid all Sendspace links. Some websites commonly used by hackers are Sendspace, Blasze, Hondachat, Bvog, and File Dropper. Avoid these kinds of websites at all costs. Sendspace, the site Jessie and Qwerty use, is a website that can install different programs to a user’s computer. Look up any links that you don’t know, and avoid anything that says:

  • Malware
  • Spyware
  • Malicious
  • Stealing Data
  • File Hosting
  • IP Logger

Stay safe, and leave suggestions for the next edition of Mach Investigates. Also, CRING, CRINGE, CRINGY :D.

This has been another post in the Mach Investigates series.


26 Responses

  1. Did I miss anything important? Was any of my information inaccurate? Do you have feedback on this topic? If so, leave a comment and/or feel free to reply to this one, and thank you for reading!

  2. I agreed with this post, ty Mach. Iy much. <3 2ND tbh

  3. Nice post and very informative 🙂

  4. I’m not a hacker. I’ve defaced sites, mostly because the owners were stupid enough to give me admin so I could ”give them cool graphics” or they gave me their account username and password. If you’re stupid enough to do that, your website deserves to get defaced.

  5. Another informative post, Mach! Mach posts give me life.

  6. I consider DDoSing hacking because it is against the law and can result in up to 20 years in prison, at least in the US.

  7. When I raided ONE event with bots last year, a lot of the community was saying “kick him out” “Ip ban him from cpac” “Banish him from the cp army community” but Jessie and Qwerty have done something FAR worse and no one is calling for anything like that

  8. Jessie and Qwerty took inspiration from Elmikey.

    Mom: You’re back! Which course did you take?

    Qwerty: An unique one, just what the doctor ordered! Hacking cp armies 🙂

  9. Hacking is for the unworthy

  10. […] the link. For more information, click for help, if you do not know what “hack” means. and if you want provide information, click to Internet Crime […]

  11. You should have made it easier for the 5 year olds to read *wary*

Leave a Reply

Your email address will not be published. Required fields are marked *