Feeds

Anonymous hacks Italy's critical-national-IT protection

Evidently the protection isn't critical

Beginner's guide to SSL certificates

Hacktivists have posted "secret documents" stolen from an Italian cybercrime unit.

The documents – 8GB of files – were extracted from a system maintained by the Centro Nazionale Anticrimine Informatico per la Protezione delle Infrastrutture Critiche (CNAIPIC), the organisation charged with guarding the country's critical IT infrastructure. In a message on Twitter announcing the release, Anonymous said it had received the files from an unnamed "source", prior to posting a sample of the files onto Pastebin. "#AntiSec strikes at Italy Government. Silent no more," it said.

The stolen documents reportedly include confidential data stored on servers that held evidence related to investigations as well as documents on the management structure of CNAIPIC and pictures of staff, among other files. Data on private firms including Gazprom and Exxon Mobil as well as foreign governments also appears to be among the cache.

Anonymous makes no direct mention on the motive for the attack, but it may well have been a retaliation to the arrests of alleged members of Anonymous in Italy earlier this month.

A story on the release can be found on The Hacker News here.

Hackers affiliated with the AntiSec movement have also hit GIS Austria, the Austrian TV licence fee collector. The organisation said 214,000 data files were swiped from its systems by Anonymous on Friday and that 96,000 of these had contained "account information". The hack is under investigation and affected customers have been informed. GIS's statement can be found here (in German). ®

Beginner's guide to SSL certificates

More from The Register

next story
Webcam hacker pervs in MASS HOME INVASION
You thought you were all alone? Nope – change your password, says ICO
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.