Feeds

Anonymous hacks Italy's critical-national-IT protection

Evidently the protection isn't critical

Internet Security Threat Report 2014

Hacktivists have posted "secret documents" stolen from an Italian cybercrime unit.

The documents – 8GB of files – were extracted from a system maintained by the Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche (CNAIPIC), the organisation charged with guarding the country's critical IT infrastructure. In a message on Twitter announcing the release, Anonymous said it had received the files from an unnamed "source", prior to posting a sample of the files onto Pastebin. "#AntiSec strikes at Italy Government. Silent no more," it said.

The stolen documents reportedly include confidential data stored on servers that held evidence related to investigations as well as documents on the management structure of CNAIPIC and pictures of staff, among other files. Data on private firms including Gazprom and Exxon Mobil as well as foreign governments also appears to be among the cache.

Anonymous makes no direct mention on the motive for the attack, but it may well have been a retaliation to the arrests of alleged members of Anonymous in Italy earlier this month.

A story on the release can be found on The Hacker News here.

Hackers affiliated with the AntiSec movement have also hit GIS Austria, the Austrian TV licence fee collector. The organisation said 214,000 data files were swiped from its systems by Anonymous on Friday and that 96,000 of these had contained "account information". The hack is under investigation and affected customers have been informed. GIS's statement can be found here (in German). ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.