Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

Team GhostShell Releases Account Data Taken from FBI, NASA, Others

In a public address from hacking crew Team GhostShell, the group said that they are taking the rest of the year off, but not before dumping 1.6 million records – taken from various government, and private sector organizations.

In a public address from hacking crew Team GhostShell, the group said that they are taking the rest of the year off, but not before dumping 1.6 million records – taken from various government, and private sector organizations.

The records leaked by Team GhostShell, come from some high-profile organizations including, NASA, Bigelow Aerospace, Aerospace Suppliers, World Airport Transfers, the Credit Union National Association (CUNA), several law firms and a handful of defense contractors. In all, the links released to the public allegedly amount to 1.6 million records.

“ProjectWhiteFox will conclude this year’s series of attacks by promoting hacktivism worldwide and drawing attention to the freedom of information on the net. For those two factors we have prepared a juicy release of 1.6 million accounts/records from fields such as aerospace, nanotechnology, banking, law, education, government, military, all kinds of wacky companies & corporations working for the department of defense, airlines and more,” the wrote in a statement.

SecurityWeek analyzed some of the records and is able to confirm that email addresses, names, and passwords do appear to come from NASA. Further, many of the files published are direct database dumps, likely obtained via SQL Injection after basic scanning. In fact, many of the organizations represented by the files have vulnerable URL parameters at first glance, but we were unable to confirm the attack methods or paths. Clearly though, some of them were using outdated CMS software, such as the organization relying on PHPNuke to power their resume submission forms and storage.

As mentioned, this latest release is reportedly the group’s last for the year. In October, the group made headlines when they released data taken from several universities, and again in August for Project Hellfire, where they compromised hundreds of websites and released more than a million records.

Written By

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.