Today @TelecomixCanada has breached Donald Trumps website because “We are writing you today via Mr Trump’s website because, seeming, the only way to get anyone to pay attention any more is to grease a Presidential candidate’s website. We agree it is a regrettable state of affairs, we blame big Quinoa mostly.” Your Moment of Zen, […]
After almost exactly 2 years and 6 months away Well-known hacker collective TeamGhostShell has returned with a rampage of leaked data from all sorts of websites.
The leak which is titled “ECA vs. Assad | Part 1” was posted to pastebin with a preview of some of the users data and a link to sendspace. The attack is apart of a bigger operation that is going on towards what the hackers are claim are pro-assad targets.
The announcement has been made from twitter and the leaked data first uploaded to MEGA as a 14MB sqlmap log file that contains 8 administrator accounts of which most appear to belong to staff from University of Missouri which makes sense as its directed by Department of Veterinary Pathobiology at the University of Missouri.
The Data leaks which started in march have so far leaked on documents from Searchinform, Russian Defence Export and Russian Industrial Investment Fund and now the most recent dump comes from China Embassy in Moscow.
4 thouz who dont wanna read the rest –
China embassy in Moscow hacked – Chinese delivered
Rusal executives backdoored equipment designated to Ukraine
GSM/CDMA provider Intertelecom –
The leak was announced a couple of hours ago via twitter and posted to cyberguerrilla.org with the following message which states that the hackers have had access to searchinform.ru since as far back as 2012 and that they have infected download links.
Today Russian hacktivist @Rucyborg has announced a big leak of files from Russian Defence Export ROSOBORONEXPORT.
This week hacker using the handle @security_511 has leaked data from two churches already and today they have just announced a third leak.
Today deletesec has announce a leak of data from what is turning out to be quiet a big target. The target is SPIROL International (http://spirol.com/) and as a result of them being it has over 30,000 company’s affected after there credentials have been leaked online. SPIROL is a international business going back to 1948 specializing in the fasting industry. The breach was announced from @Deletesecs twitter account and has posted 3 csv files to media fire.