Feeds

Anonymous and LulzSec spew out largest ever police data dump

Hacktivists run wild in global revenge hacks

The smart choice: opportunity from uncertainty

Hacktivists have released a huge cache of stolen data from US law enforcement agencies as revenge for the arrest of alleged members of LulzSec and Anonymous.

The 10GB data dump covered personal information, email addresses, social security numbers, and credit card details swiped from an online sheriff's store. The batch also covered data on informants.

The information covered 76 law enforcement websites in 11 states, most reportedly hosted by the same firm, Arkansas-based Brooks-Jeffrey Marketing.

The hack was carried out on 31 July by members of AntiSec – an ongoing operation run by Anonymous and spin-off hacker group LulzSec. A sample of social security numbers of over 100 police officers from the Missouri Sheriffs' Association website was released at the time. Now the hacktivists have upped the ante with the release of what appears the be the whole batch of 10GB, the biggest ever release of data.

Hacktivists across the globe pitched in across the weekend. For example, LulzSec Brazil reportedly leaked 8GB of Federal Police Data.

Meanwhile, in response to threats from the government of Ecuador, Anonymous releases personal data (names, ID numbers, dates of birth etc) on 45,000 local police officers.

In addition, the The official website of the Syrian Ministry of Defense was attacked and defaced by members of Anonymous. The hack was a protest at the Middle Eastern state's ongoing, bloody crackdown on anti-government protests.

Finally the Twitter account of the Minister of the Interior and Justice of Colombia was hacked.

The mayhem and mischief is set to continue for the rest of the summer, at least. Digital chatter suggests that TeaMp0isoN and Anonymous have agreed to participate in some form of "digital activism" that's said to be unrelated to hacking. TeaMp0isoN is another hacktivist group best known for a hack on the English Defence League website back in February. ®

Designing a Defense for Mobile Applications

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.