Security Experts:

Team GhostShell Releases Account Data Taken from FBI, NASA, Others

In a public address from hacking crew Team GhostShell, the group said that they are taking the rest of the year off, but not before dumping 1.6 million records – taken from various government, and private sector organizations.

The records leaked by Team GhostShell, come from some high-profile organizations including, NASA, Bigelow Aerospace, Aerospace Suppliers, World Airport Transfers, the Credit Union National Association (CUNA), several law firms and a handful of defense contractors. In all, the links released to the public allegedly amount to 1.6 million records.

“ProjectWhiteFox will conclude this year's series of attacks by promoting hacktivism worldwide and drawing attention to the freedom of information on the net. For those two factors we have prepared a juicy release of 1.6 million accounts/records from fields such as aerospace, nanotechnology, banking, law, education, government, military, all kinds of wacky companies & corporations working for the department of defense, airlines and more,” the wrote in a statement.

SecurityWeek analyzed some of the records and is able to confirm that email addresses, names, and passwords do appear to come from NASA. Further, many of the files published are direct database dumps, likely obtained via SQL Injection after basic scanning. In fact, many of the organizations represented by the files have vulnerable URL parameters at first glance, but we were unable to confirm the attack methods or paths. Clearly though, some of them were using outdated CMS software, such as the organization relying on PHPNuke to power their resume submission forms and storage.

As mentioned, this latest release is reportedly the group’s last for the year. In October, the group made headlines when they released data taken from several universities, and again in August for Project Hellfire, where they compromised hundreds of websites and released more than a million records.

view counter
Steve Ragan is a security reporter and contributor for SecurityWeek. Prior to joining the journalism world in 2005, he spent 15 years as a freelance IT contractor focused on endpoint security and security training.