Original URL: http://www.theregister.co.uk/2011/11/30/un_hack/
UN's lax security exposed by password-slurping hacktivists
Login details and email addresses dumped after raid
Hacktivist group TeaMp0isoN has hacked into the website of the United Nations Development Programme, making off with hundreds of email addresses, usernames and plain-text passwords that were later dumped onto Pastebin.
Individuals working for the UNDP, the Organisation for Economic Co-operation and Development, UNICEF, the World Health Organisation and other groups were exposed by the hack, which revealed lax password security at the agencies. Some of the accounts appeared to have a blank password and many more have easily guessable login credentials. And storing passwords in plain-text (rather than an encrypted form) is an even bigger mistake, of course.
TeaMp0isoN said that it carried out the attack as a protest against what it sees as corruption at the UN. In particular it is upset with the organisation's handling of the genocide in Rwanda, the break-up of Yugoslavia and the Palestinian-Israeli conflict, among other matters.
Security watchers were skeptical of the UN's attempt to downplay the significance of the hack.
Jason Hart, managing director of Cryptocard, commented: “The UN is seen as a symbol for security and trust for many millions of people around the world. Hacking their systems is TeaMp0isoN's way of making a big statement to the outside world.”
“The UN has said that the information exposed is old data, but if you look at the YouTube video released by the hackers on Monday it shows account details and usernames as well as personal email addresses. As we all know, passwords cross personal and professional lives, so these people could well be compromised at work and at home," Hart added.
TeaMp0isoN recently joined forces with Anonymous as part of Operation Robin Hood, which aims to defraud banks by making donations to charities and other worthwhile causes using stolen credit card details.
More security commentary on TeaMp0isoN's antics can be found in a blog post by Sophos here. ®