Feeds

LulzSec say they'll release big Murdoch email archive

Rebekah Brooks apparently not a password genius

Remote control for virtualized desktops

The hacktivists behind a hack on The Sun's website claim to have extracted an email archive which they plan to release later on Tuesday.

News International's systems were hacked on Monday night. As a result, visitors to The Sun's website were redirected towards a fake story on the supposed death of Rupert Murdoch by infamous hacktivist collective LulzSec. The group also redirected visitors to the main News International website to the LulzSec Twitter feed. In addition, the hack may have allowed LulzSec to gain access to News International's email database.

Sabu, a prominent member of LulzSec, said via Twitter that the group was sitting on emails of News International staffers that it planned to release on Tuesday.

In the meantime, Sabu released email login details for former News International chief exec Rebekah Brooks, a central figure in the News of the World voicemail-hacking scandal.

Brooks (then called Wade), edited The Sun between 2003 and 2009, and – at least according to LulzSec – had been using the password 63000 to access her email account at the paper. As IT blogger John Graham-Cumming points out, 63000 is the same number as the text tip-off line used by the Sun.

LulzSec also posted the supposed password hash – but not the password – of Bill Akass, former managing editor of the News of the World.

The hackers also posted the mobile phone numbers of three News International execs. This information seems to have come from, at best, an old database. The Telegraph reports that one of the phone numbers belongs to Pete Picton, a former online editor with The Sun who left to work on News Corp's iPad-only publication, The Daily, last year. Another phone number belongs to Chris Hampartsoumian, an IT worker. Hampartsoumian recently announced, via Twitter, that he does not work for any News Corp firm.

LulzSec certainly obtained deep enough access to News International systems during the Monday break-in to pull off a redirection hack on The Sun, but whether it obtained the depth of access it claims to have done remains unclear. A News International spokeswoman declined to comment when we asked if the organisation was taking the email hack claims seriously or whether it was taking any remedial action.

She said the firm was "aware" of the website redirection hack on The Sun, adding that all News International websites were now up and running as normal.

However The Guardian reports that News International took its webmail systems and remote access systems offline as a precaution following The Sun website redirection hack. Passwords were reset before remote access and other systems were restored on Tuesday morning, the paper adds. ®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.