Feeds

Hacker claims breach of Wall Street Journal and Vice websites, punts 'user data' for sale

Also supposedly hit a gadgets site called 'CNET'

Secure remote control for conventional and virtual desktops

A hacker known for attacking news websites has claimed successful hacks against both the Wall Street Journal and Vice.

An individual going under the handle "w0rm" posted screenshots in a bid to substantiate his claims of hacks against the WSJ (here) and Vice (here) before offering to sell stolen databases from both publications for 1 BTC apiece ($620).

These screenshots appear to show extracted strings from stolen databases with users' credentials.

w0rm's hack claims are credible but unconfirmed, according to El Reg's security sources.

We invited the Wall Street Journal and Vice to comment on the reported hacks but are yet to hear back. We'll update this story as and when we hear more.

Comment

Last weekend hackers hijacked the Wall Street Journal’s Facebook page to falsely claim that Air Force One had gone missing over Russian airspace, a claim likely to spook the US public especially in the wake of the unfolding MH17 shot-down airline disaster in eastern Ukraine. It's unclear whether or not the two incidents are linked.

The whole security flap follows just days after w0rm claimed responsibility for an attack against a gadget website named CNET, a claim he followed up with an offer to flog off a CNET database supposedly containing one million usernames, passwords and email addresses. He also offered to sell the website's operators a protection system.

The hack was reportedly pulled off by exploiting flaws in the Symfony PHP framework used by the CNET site.

The CNET team downplayed the incident, saying only a "few servers were accessed" and the problem was quickly contained and resolved.

"We identified the issue and resolved it a few days ago," a spokesman told El Reg. "We continue to monitor and are investigating for any potential impact."

w0rm was previously linked to a high-profile hack against the BBC last December. He previously used nicknames including "rev0lver" or "rev", according to El Reg's sources.

The hacker is thought to be primarily financially motivated. He trades stolen databases with other cybercriminals and spammers through underground forums. w0rm is also thought to have a finger in the murky world of computer exploit sales. ®

New hybrid storage solutions

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Snowden, Dotcom, throw bombs into NZ election campaign
Claim of tapped undersea cable refuted by Kiwi PM as Kim claims extradition plot
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.