[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[ISN] Hackers steal passwords from military dating site



http://news.cnet.com/8301-1009_3-57404815-83/hackers-steal-passwords-from-military-dating-site

By Elinor Mills
Security
CNET News
March 26, 2012

Hackers broke into the database for a military dating Web site and stole passwords, e-mail addresses, and other information from nearly 171,000 accounts, according to a post on the Pastebin site this weekend:

"The website http://www.militarysingles.com/ was recently closed day ago or so, so we dumped email db," the hackers said in their post. "There are emails such as @us.army.mil ; @carney.navy.mil ; @greatlakes.cnet.navy.mil ; @microsoft.com ; etc.."

So-called "data dumps" are a common occurrence, but what makes this one notable is that the group is using the names "LulzSec" and "LulzSec Reborn." The FBI announced the arrest three weeks ago of alleged key members of the LulzSec group of hackers who had taunted government agents and harassed government contractors and other corporations by attacking their sites and stealing data since last year. The group was reportedly brought down by one of their own, known as "Sabu," who had apparently been working as an informant since last summer when he pleaded guilty to computer hacking conspiracy and other charges.

The group took credit for attacks on sites belonging to Sony, PBS.org, the U.S. Senate, CIA, Arizona sheriffs, and others before announcing last June that they were calling it quits following a 50-day hacking spree. Their retirement was short lived though, as hackers using the LulzSec name continued their seige on law enforcement and corporate sites.

[...]


______________________________________________________________________________
Certified Ethical Hacker and CISSP training with Expanding Security gives
the best training and support.  Get a free live class invite weekly.  Best
program, best price. www.ExpandingSecurity.com/PainPill