Anonymous’ use of LOIC during Operation: Payback was very effective; PayPal, among other targets, were successfully DDoSed. But every tool expires, and the Ion Canon never properly killed Kane anyway.
With this in mind, Anonymous has announced the creation of a new weapon, and gone public with their first test. It is known as RefRef. Aside from that, there’s nothing concrete.
One website, www.refref.org, makes a heavily implied claim to ownership or participation in the coding of RefRef, going so far as to list the programmers names and claiming that Perl, Python, and Java are being used in its creation.
A pastebin post has also been claiming to have the leaked code for RefRef.
AnonCMD, meanwhile, called out refref.org today as an imposter, claiming that RefRef is only being written in Java, and announcing a release date of September 17th for the finished product. Those claims are roughly echoed by AnonOps’ report (made on August 2nd).
From that article:
AnonCMD.wordpress.com has been taking credit for Wikileaks.org’s recent downtime via twitter, calling it another RefRef test. RefRef was previously mentioned on Twitter by Pastebin.com’s official account. Pastebin was targeted in the first test.
So, there’s plenty of information about RefRef, but none of it appears to be true. AnonOps is a trusted and longstanding part of the community, but even their information is “according to an Anon promoting it on IRC this afternoon.” That leaves us with only one thing to infer about RefRef: LOIC’s lack of anonymity allowed police forces to arrest (approximately) .0032% (~16) of the (approximately) 5,000 attackers. If the creators of this mythical program, the lone Anon on IRC, and the assumptions of AnonOps’ are to be trusted, then RefRef will allow non-savvy anons to join online attacks without the threat of arrest.
The joltleft.com will update you on September 17th, if RefRef is released.