Blog Posts Tagged with "Data Dump"

03b2ceb73723f8b53cd533e4fba898ee

ProjectWhiteFox 1.6M accounts exposed,Team Ghostshell vs UN Y.2770 standard

December 12, 2012 Added by:Pierluigi Paganini

The hackers during the operation named ProjectWhiteFox have targeted a wide range of companies operating in different sectors such as aerospace, nanotechnology, banking, law, military, education and government, following a list of the targets hacked...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Yahoo and Billabong Password Dumps Analyzed

July 19, 2012 Added by:Dan Dieterle

Wow, not one, but two massive password dumps in one day. Hackers leaked a very large number of Billabong and Yahoo passwords in plain text with no need to try to crack them. We looked at the passwords using the analysis tool Pipa, and here is what we found...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Yahoo!'s No Encryption Trumps LinkedIn's Unsalted Hash

July 12, 2012 Added by:Headlines

Just a month after LinkedIn experienced a significant security breach and caught flack for not "salting their hash", the revelation that the Yahoo! credentials were not even stored in an encrypted format should have everyone concerned about how seriously companies are taking the security of their users...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wanna Buy Some Dumps?

July 07, 2012 Added by:Robert Siciliano

“Dumps” are batches of stolen credit card numbers. This example of a criminal’s sales pitch for stolen dumps came to me through a comment on a blog post I wrote about credit card security. Go figure. If you scan the following message line by line, you’ll see there’s a great deal of thought put into the pitch...

Comments  (7)

11146d62a6c31fb9fac8ac8ac991e08d

We Don’t Need Cyber-Vigilante Justice

June 15, 2012 Added by:Andy Willingham

You see what made me so mad? It wasn’t the release of the PII of all those innocent people, it was their reason for doing it. They reported a web site vulnerability and it wasn’t fixed, so they decided to post PII of thousands of people on the internet. Who put them in the role of deciding who wins and who loses?

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Anonymous Claims Department of Justice Hack, Data Dump

May 22, 2012 Added by:Headlines

"The department is looking into the unauthorized access of a website server operated by the Bureau of Justice Statistics that contained data from their public website. The... website has remained operational throughout this time. The department’s main website... was not affected..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Hacktivists Claim Government and Military Systems Breach

May 03, 2012 Added by:Headlines

A new hacktivist group claims to have breached the systems of multiple government, military and private organizations. The hackers posted screenshots of their intrusions to support their claims, as well as posting what is characterized as military files for access on MediaFire...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

The Jester Posts PGP Data File from Webkit Exploit Op

March 12, 2012 Added by:Headlines

The Jester posted a link to data exfiltrated during last week's Webkit exploit aimed at mobile device users who scanned the QR-code posted as an avatar on his Twitter account and then were cross-referenced with a database of targeted jihadi and Anonymous operatives...

Comments  (2)

69dafe8b58066478aea48f3d0f384820

Symantec Confirms 2006 Norton AV Source Code Dump

March 09, 2012 Added by:Headlines

“Symantec can confirm that the source code for 2006 versions of Norton Antivirus posted by Anonymous is authentic. The exposure of this code poses no increased risk to Norton or Symantec customers. This code is part of the original cache of code for 2006 versions of the products..."

Comments  (0)

0a8cae998f9c51e3b3c0ccbaddf521aa

Difference Between Spreading Information and Enabling Crime

February 14, 2012 Added by:Rafal Los

Most people don't get prosecuted or charged for distributing or re-tweeting a link to an Anonymous pastebin dump. Where is the line drawn then, and why are some incidents bigger than others? The question ultimately goes to the contents of the cache of information...

Comments  (2)

7fef78c47060974e0b8392e305f0daf0

Cyberwar Comes to a Mall in Fresno? Not so Much...

January 24, 2012 Added by:Infosec Island Admin

A Pastebin dump alleged to be from Anonymous has forty-nine IP addresses with SCADA systems on them. Furthermore, those systems were claimed to not have any authentication on them whatsoever. I checked the IP’s and I have to say “meh” on this little dump by the skiddies...

Comments  (5)

7fef78c47060974e0b8392e305f0daf0

Take That Israel! All Your SCADA's Are Belong to Us!

January 20, 2012 Added by:Infosec Island Admin

The SCADA were not in default state for passwords, and in general did not seem to be important systems - like government or large power company hardware. Hell, for that matter, none were even water facilities, which I should think in a desert would be kinda important, no?

Comments  (2)

6d117b57d55f63febe392e40a478011f

Hacker to Release Symantec's PCAnywhere Source Code

January 16, 2012 Added by:Anthony M. Freed

YamaTough, spokesperson for the hacktivist group “The Lords of Dharmaraja”, informed Infosec Island of plans to release source code for Symantec's PCAnywhere. The release is to be made prior to the threatened exposure of the full source code for the Norton antivirus...

Comments  (7)

924ce315203c17e05d9e04b59648a942

Fallout from the Christmas Hack of Stratfor

January 03, 2012 Added by:Richard Stiennon

The most painful lesson the Stratfor hack is about to demonstrate is the importance of email security. Anonymous will be recruiting volunteers to analyze the 3.3 million emails they stole that have the potential for real harm equal to the infamous WikiLeaks State Department leak...

Comments  (0)

7fef78c47060974e0b8392e305f0daf0

Operation DarkNet: A Good Start, But There is More to Do

October 20, 2011 Added by:Infosec Island Admin

Due to the nature of the site and its being in the hidden wiki (DarkNet) it is tough to know exactly where the systems sit that house/host the content, but, it seems that through certain techniques using TTL, they pretty much have a good idea of where the server may sit in the continental US.

Comments  (5)

69dafe8b58066478aea48f3d0f384820

AntiSec Hackers Release Sensitive VDI Documents

August 19, 2011 Added by:Headlines

AntiSec hackers have made good on their threat to release sensitive emails and documents stolen in an operation against defense contractor VDI, revealing evidence that financial giant Merrill Lynch may have tipped off VDI about S&P plans to downgrade the U.S. government's credit rating...

Comments  (0)

Page « < 1 - 2 > »