Feeds

Hactivist crew smacks down Russia.gov: Spies are RICH enough

Pastebin dump revenge for 'wasting cash on espionage'

Security for virtualized datacentres

A hactivist crew has launched a cyber-offensive against Russia with the leak of 2.5 million records, which it claims to have obtained from hacked government and corporate servers.

Team GhostShell said it was leaking the data in protest against the Russian government's willingness to plough its revenues into espionage "even though the country is going through hard times and many people are starving". In a notice accompanying the release, in which it describes Russia as "a state of tyranny and regret", the group boasts that it is only releasing a sample of the huge cache of data it has pwned.

GhostShell is declaring war on Russia's cyberspace, in "Project BlackStar". The project is aimed at the Russian Government. We'll start off with a nice greeting of 2.5 million accounts/records, from governmental, educational, academical, political, law enforcement, telecom, research institutes, medical facilities, large corporations (both national and international branches) in such fields as energy, petroleum, banks, dealerships and many more.

GhostShell currently has access to more Russian files than the FSB and we are very much eager to prove it. - DeadMellox

Many of the documents in the first tranche are purported to have originated from Russian metal working firm MetalProm and recruitment firm Rabota Izhevsk. Russian police and Lada-making auto firm AvtoVAZ account for a handful of files. Most of the documents seem to be system files or database dumps rather than login IDs. The authenticity of the data is, of course, hard to determine.

Team GhostShell, whose motto on Twitter is "forever owning China's cyberspace for the lulz", is lead by self-proclaimed black hat hacker DeadMellox. Its previous exploits have included hacking into the databases of banks, US government agencies and consultancy firms before leaking passwords and other documents back in August. The group has also to have accessed a Chinese technology vendor’s mainframe, a US stock exchange and the Department of Homeland Security. These boasts remain unsubstantiated.

Last month Team GhostShell attacked the world's top 100 universities in a protest against tuition fees and what it reckons to be the falling quality of education across many countries. ®

Remote control for virtualized desktops

More from The Register

next story
UK smart meters arrive in 2020. Hackers have ALREADY found a flaw
Energy summit bods warned of free energy bonanza
DRUPAL-OPCALYPSE! Devs say best assume your CMS is owned
SQLi hole was hit hard, fast, and before most admins knew it needed patching
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Mozilla releases geolocating WiFi sniffer for Android
As if the civilians who never change access point passwords will ever opt out of this one
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.