Feeds

Anonymous hacks Italy's critical-national-IT protection

Evidently the protection isn't critical

The essential guide to IT transformation

Hacktivists have posted "secret documents" stolen from an Italian cybercrime unit.

The documents – 8GB of files – were extracted from a system maintained by the Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche (CNAIPIC), the organisation charged with guarding the country's critical IT infrastructure. In a message on Twitter announcing the release, Anonymous said it had received the files from an unnamed "source", prior to posting a sample of the files onto Pastebin. "#AntiSec strikes at Italy Government. Silent no more," it said.

The stolen documents reportedly include confidential data stored on servers that held evidence related to investigations as well as documents on the management structure of CNAIPIC and pictures of staff, among other files. Data on private firms including Gazprom and Exxon Mobil as well as foreign governments also appears to be among the cache.

Anonymous makes no direct mention on the motive for the attack, but it may well have been a retaliation to the arrests of alleged members of Anonymous in Italy earlier this month.

A story on the release can be found on The Hacker News here.

Hackers affiliated with the AntiSec movement have also hit GIS Austria, the Austrian TV licence fee collector. The organisation said 214,000 data files were swiped from its systems by Anonymous on Friday and that 96,000 of these had contained "account information". The hack is under investigation and affected customers have been informed. GIS's statement can be found here (in German). ®

5 things you didn’t know about cloud backup

More from The Register

next story
Ice cream headache as black hat hacks sack Dairy Queen
I scream, you scream, we all scream 'DATA BREACH'!
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
Attack flogged through shiny-clicky social media buttons
66,000 users popped by malicious Flash fudging add-on
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.