After ProjectDragonFly (100,000 accounts leaked from Chinese Sites), Project Hellfire (one million accounts belonging to Governments, Law Enforcement Agencies, etc.) and ProjectWestWind (120,000 accounts from top 100 universities all over the world), Team GhostShell has unveiled a new act of their cyber campaign against Governments and Organizations all over the world.
GhostShell (@TeamGhostShell) November 02, 2012
The latest operation is called ProjectBlackStar. In a clamorous protest against the Russian Government and the current situation (the still present communism feeling […] fused with todays capitalism and bred together a level of corruption and lack of decency of which we’ve never seen before), the collective has leaked 2.5 million accounts belonging to different sectors directly or indirectly related to government. Quoting literally: We’ll start off with a nice greeting of 2.5 million accounts/records leaked, from governmental, educational, academical, political, law enforcement, telecom, research institutes, medical facilities, large corporations (both national and international branches) in such fields as energy, petroleum, banks, dealerships and many more.
The massive leak has been split in different files. The list of targets is long and heterogeneous, and include several high-profile targets (such as the Jinr, Joint Institute for Nuclear Research).
This summer. when unveiling the leak of Project Hellfire, the collective anticipated two more projects scheduled for this fall and winter. Apparently they run faster than the timetable: only in this fall two projects have already been “delivered” (pretty much earlier than expected). Will their fury stop here?
This summer, when Team GhostShell released one million accounts as part of their Project HellFire campaign, I was particularly impressed by one sentence contained in the pastebin statement which accompanied the release.
One million accounts/records leaked. We are also letting everyone know that more releases, collaborations with Anonymous and other, plus two more projects are still scheduled for this fall and winter. It’s only the beginning.
I was wondering what else the hacking collective had in mind, and unfortunately I did not have to wait too long for the answer. As promised, at the beginning for this fall Team GhostShell returned with a new campaign called “ProjectWestWind”, aimed at “raising awareness towards the changes made in today’s education, how new laws imposed by politicians affect us, our economy and overall, our way of life”.
Their interpretation of their concept of “raising awareness” is a little bit complicated since, in order to raise awareness they hacked top 100 International Universities and leaked more than 120,000 accounts (leaving in their servers hundreds of thousands more). The list includes Harvard, John Hopkins, the University of Michigan, Tokyo University, New York University, Princeton and the University of Rome and leaked data contains email addresses, hashed passwords, IDs and names of students and faculty members.
It worth to mention that they claimed to have found a lot of servers infected with malware, and some other storing credit card information.
There is not so much to comment. I would prefer to limit myself to the Italian situation: when dealing with the quality of infrastructures, Italian Universities rank inevitably at the bottom of every possible chart, when dealing with being hacked, they rank inevitably at the top…
Here the first part with the timeline from 1 to 15 August 2012.
Here we are with the second part of the August 2012 Cyber Attacks Timeline. A second part of the month that has been characterized by hacktivism, most of all because of the so-called OperationFreeAssange, which has targeted many high-profile websites.
Among the targets of the month, Philips has been particularly “unlucky”. The Dutch giant has been the victim of three Cyber Attacks, even if there are several doubts about the authenticity of the hacks.
But maybe the biggest operation of the month is the #ProjectHellFire, carried on by the collective @TeamGhostShell, that has unleashed something as 1 million of accounts belonging to different sectors (banks, government agencies, consulting firms, law enforcement and the CIA). And the group promises new action for this Fall and Winter.
The Middle East confirms to be very hot, with a new Cyber Attack, probably another occurrence of Shamoon, targeting RasGas, yet another Oil Company.
Just one note: of course it is impossible to track all the targets of the #OpFreeAssange. You can find a complete list at cyberwarnews.info.
If you want to have an idea of how fragile our data are inside the cyberspace, have a look at the timelines of the main Cyber Attacks in 2011 and 2012 and the related statistics (regularly updated), and follow @paulsparrows on Twitter for the latest updates.
Also, feel free to submit remarkable incidents that in your opinion deserve to be included in the timelines (and charts).