A new hacktivist group has emerged claiming to have breached the systems of multiple government, military and private organizations.
The group says it has posted administrative account login information and released personal information of employees from some of the targets.
The hackers also posted screenshots of their intrusions in an effort to support their claims, as well as posting what is characterized as military files for access on MediaFire.
The group, which identifies itself as "The Unknowns", says it has gained access to the systems of the following:
- NASA - Glenn Research Center
- US military
- US AIR FORCE
- European Space Agency
- Thai Royal Navy
- Renault Company
- French ministry of Defense
- Bahrain Ministry of Defense
- Jordanian Yellow Pages
In addition to the list of targets, the group also posted the following message on Pastebin:
Victims, we have released some of your documents and data, we probably harmed you a bit but that's not really our goal because if it was then all of your websites would be completely defaced but we know that within a week or two, the vulnerabilties we found will be patched and that's what we're actually looking for.
We're ready to give you full info on how we penetrated threw your databases and we're ready to do this any time so just contact us, we will be looking forward for this.
And for all the other websites out there: We're coming, please, get ready, protect your website and stop us from hacking it, whoever you are. Contact us before we take action and we will help you, and will not release anything... It's your choice now.
And for the Public: We're looking for your support... Support us to deliver our message to everyone out there...
ZDnet's Emil Protalinski is reporting that the group may in fact be using old data previously released in an effort to gain a following, and that there may be little truth to their claims of new breaches.
"I’m hearing that The Unknowns may be trying to use an old hack to gain Twitter followers. Some of the leaked documents are indeed several years old, but there are also a few from earlier in 2012. I will update you again if I learn more," Protalinski wrote.