Attacks By Team Ghost Shell

Tags

TeamGhostShell, DeadMellox

Oz Data Centa

  • Project Sunrise OpPage, Link
  • Project West Wind OpPage, Link
  • Project Hell Fire, OpPage Link
  • Project Dragon Fly OpPage, Link
  • Entries at Oz Data Centa hack archive with @TeamghostShell,  Link

Past Operations

Members

  • @DeadMellox
  • @OphiusLab
  • @MidasBank
  • @TeamGhostShell

Pastebin

https://pastebin.com/u/TeamGhostShell

Time Line

2013/01/28- 23 South African sites hacked, 700,000 Account and credentials leaked. Article

  • PostNet hacked, 11,299 accounts leaked, Article

2012/10/03- 100+ Education hacked, thousands of accounts leaked. Article

2012/08/27- Update, Further information from Massive leak, Article

2012/08/26- CIA, MIT, Governments, businesses, 100+ sites hacked & accounts leaked, Article

2012/07/18- 50,000 Accounts Leaked From ITWallStreet.com, Article

2012/07/04- 300,000 Personal Details Leaked, 38 Sites Hacked, Article

2012/06/12- 16 further Government sites hacked, Article

  • High Commission of India Hacked,Data Leaked, Article
  • SEPRELAD Hacked, Data Leaked, Article
  • Social Action Secretariat Hacked, Accounts Leaked, Article
  • City Of San Marzano, Italy, Hacked, Defaced & 7 Government Sites Data Leaked, Article
  • Interview: @DeadMellox , hacker who breached Chinese government, Article
  • Massive Amount Of breached Chinese Government Servers, Article

2012/05/08- Hangzhou Dianzi University Hacked, 150,000 Accounts Leaked, Article

  • The European Forex Traders hacked and 1800 accounts leaked , Article

Operation Statements

Project SunRise

After two months of investigations, Team GhostShell has finally managed to fingerprint the entire top business infrastructure of South Africa, tracing some of it's activities to other countries across the continent. As always, we will provide you with a glimpse of that world, so that everyone else can do their own research and draw their own conclusions from it. Although this time around, the goal was not to release a large portion of data, we will still provide you with enough non-disclosure accounts and records from a variety of businesses; corporations and governments. The point of it is to find and see for yourselves the connections these entities have with one another, how they conduct themselves on the financial playing field but also economically speaking, how they actually do business world-wide. The data here ranges from government, banking, mining, petroleum, management, networking, transport services, construction, education/academics, other enterprises. This project also ended up coinciding with one of our off-scene black operations regarding the oil industries in North Africa. Ties with the CIA have been made inside Angola and as such we'll release a small teaser about it as well to promote this. We are all ghosts living inside the shell.

Project hell fire

All aboard the Smoke & Flames Train. Last stop, Hell. You can have the pleasure of sharing seats with targets such as WallStreet, CIA Services, MIT, Consulting Firms, Political Advisors, Security Companies, Corporations, Weapon's Dealers, Laboratories, Internet Hosting Services, Academics, Banks, Police Departments, Aviation, The Navy, Stocks Exchange, Bonds Exchange, Markets, Emirates Organizations, Various Businesses, Hedge Funds, Estate Agencies, Public Affairs, Robotics, etc. Team GhostShell's final form of protest this summer against the banks, politicians and for all the fallen hackers this year. With the help of it's sub-divisions, MidasBank & the newest branch, OphiusLab. One million accounts/records leaked. We are also letting everyone know that more releases, collaborations with Anonymous and other, plus two more projects are still scheduled for this fall and winter. It's only the beginning. To conclude this summer's hacking spree, I will be giving away to anyone who's up for the challenge three different access points to three different groups/crews out there. It's our way of saying how great it's been raiding with you and let's hope that it isn't over just yet. The access-points are the following: 1. Six billion databases from a chinese mainframe full of chinese & japanese technology. It's very possible that it has from other countries as well, we haven't checked them all for obvious reasons. 2. Over 105 billion databases to a US stockexchange mainframe/s. It's very possible that the actual number is over 1 trillion, I wasn't prepared the first time and it gave me a memory error after 105 when it tried to add another digit. This job will require you to have at least 1TB available. 3. Access-points to 3-4 different servers belonging to the Department of Homeland Security. The sensitive information isn't that great but it may be good for street cred. Ok, that's all. Whoever wants any of them, you can contact me at voxanon. (make sure my nick is registered, there are many impostors out there). Oh, and people have kept asking me about the WallStreet hack from MidasBank. We have uploaded it once more here for you and it's also at our friends from Par-AnoIA. (https://par-anoia.net/midasbank/) C ya all in the fall - DeadMellox

#ProjectWestWind

Our targets for this release have been the top 100 universities around the world. After carefully filtering the ones that we've already leaked before and the ones where Anonymous has in major operations, we have eventually got together a new fresh list. The majority of them should be here. Also, some of us decided to go ahead and add vulnerable links to the other ones anyway, which you can find at the bottom, at "Other Universities". side note* We tried to keep the leaked information to a minimum, so just around 120.000+ accounts and records are here, leaving in their servers hundreds of thousands more. (When we got there, we found out that a lot of them have malware injected. No surprise there since some have credit card information stored.)

Lee Johnstone

Lee Johnstone

Information Security Data Analyst, Investigative Journalist, Technology Lover, Mechanic.

Read More