PDA

View Full Version : Ghostshell Hackers Claim NASA, Interpol, Pentagon "Juicy Release" Breach




presence
12-11-2012, 04:28 PM
http://www.informationweek.com/security/attacks/team-ghostshell-hackers-claim-nasa-inter/240144111
http://cdn.cyberwarnews.info/wp-content/gallery/projectwhitefox/nc6av.jpg


Hacking group Team Ghostshell Monday announced its latest string of exploits, as well as the release of 1.6 million accounts and records gathered as part of what it has dubbed Project WhiteFox. The hacked organizations allegedly include everyone from the European Space Agency (ESA) and the Japan Aerospace Exploration Agency (JAXA), to the Department of Defense and defense contractor L-3 Communications. "'Kay, let's get this party started! ESA, NASA, Pentagon, Federal Reserve, Interpol, FBI try to keep up from here on out because it's about to get interesting," said the group in a Pastebin post (http://pastebin.com/agUFkEEa), making reference to some of the organizations with servers it claimed to have hacked.


The resulting data that was copied and released by Team Ghostshell, and which largely appears to be in the form of server database tables, spans over 140 separate uploads -- all mirrored to multiple sites. Seventeen of those uploads relate to data grabs allegedly obtained from the Credit Union National Association (http://www.cuna.org/) (CUNA), which bills itself as "the premier national trade association serving credit unions." Team Ghostshell said the related data dump puts

"over 85 mil. people at risk,"

while noting that "we've keep (sic) the leak to as little as possible." As of press time, CUNA's website was offline.



Meanwhile, 36 of Team Ghostshell's uploads appeared to involve data stolen from airport transfer firm World Airport Transfer, which is based in Ohio and owned by Tours & Co; 23 uploads are from California Manufacturers & Technology Association; 19 from Crestwood Technology Group; and eight from NASA's Center for Advanced Engineering Environments. Some of the other breached organizations appeared to include the Institute of Makers of Explosives, law firm Glaser Weil, the Defense Production Act (DPA) Title III Program, intelligence company Aquilent, the Texas Bankers Association, and the University of Texas at Austin School of Law's continuing education program.

The hackers apparently were also able to access servers that are part of ICS-CERT, the Department of Homeland Security Information Network, the FBI's Washington division in Seattle, intelligence company Flashpoint Partners, and Raytheon. It promised to warn affected organizations, via an email from deadmellox@tormail.org. "The email will also contain another 150 vulnerable servers from the Pentagon, NASA, DHS, Federal Reserve, intelligence firms, L-3 CyberSecurity, JAXA, etc. consider it an early Christmas present from us," said Team Ghostshell.


In what it has dubbed its year-end wrap up, the hacking group also detailed an identity -- "DeadMellox" -- which it said that its members had created to trace the flow of information relating to hackers. "'DeadMellox' was a ghost to begin with. Never existed. No, really. Before we created 'him,' he never exited (sic) on the internet, zero searches on google and all that jazz. Starting to get it now? We used the name afterwards to trackback all mentions of that name all over the place," said the group via Pastebin.

As part of its massive dox -- aka data dump -- Team Ghostshell included a briefing document allegedly stolen from Flashpoint Partners, the private intelligence firm that recently scored an interview with the U.S. bank attackers (http://www.informationweek.com/security/attacks/us-bank-attackers-dispute-iran-ties/240142895). The document lists the Twitter feed of DeadMellox (https://twitter.com/deadmellox) as a source for the company's Team Ghostshell intelligence. To obtain the document, the hacking group claimed to have penetrated the Flashpoint network. "Interesting fact is that we weren't the only ones in there doing espionage," it said.

Earlier efforts by Team Ghostshell have included the release of 50,000 user accounts stolen from a jobs board that focuses on Wall Street (http://www.informationweek.com/security/attacks/hackers-claim-wall-street-resume-leak/240004023), and the release of 120,000 records from 100 of the world's top universities (http://www.darkreading.com/identity-and-access-management/167901114/security/attacks-breaches/240008262/team-ghostshell-exposes-120-000-records-from-universities.html), including Harvard and Oxford.

Last month, meanwhile, after "declaring war on Russia's cyberspace" as part of what it dubbed Project BlackStar (http://www.darkreading.com/database-security/167901020/security/attacks-breaches/240034513/team-ghostshell-declares-war-on-russia-s-cyberspace.html), the group claimed to have leaked 2.5 million records and accounts related to a number of Russian government, law enforcement, and business organizations.



Note here... I'm citing www.informationweek.com (http://www.informationweek.com) am authoritative journalistic source on data security:


said the group in a Pastebin post (http://pastebin.com/agUFkEEa), making reference to

and this pastebin post has links to all kinds of nefarious information. The same type of which informationweek tells us here:

http://www.informationweek.com/security/attacks/anonymous-no-longer-hacktivist-spokesman/240144134

that a hacker "spokesman" was recently charged for "posting a hyperlink providing access to stolen data"

additional sources:

http://www.cyberwarnews.info/2012/12/11/who-got-breached-in-projectwhitefox-1-6-million-account-leak/