{"id":3368,"date":"2012-08-29T13:55:40","date_gmt":"2012-08-29T12:55:40","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3368"},"modified":"2015-09-09T19:36:56","modified_gmt":"2015-09-09T11:36:56","slug":"1-million-accounts-leaked-from-banks-government-agencies-consultancy-firms","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2012\/08\/1-million-accounts-leaked-from-banks-government-agencies-consultancy-firms\/","title":{"rendered":"1 Million Accounts Leaked From Banks, Government Agencies & Consultancy Firms"},"content":{"rendered":"

Seems like some hactivists have been working hard, 1 million accounsts were leaked over the weekend from some pretty serious sources by the group Team GhostShell – who are affiliated with Anonymous<\/a>.<\/p>\n

It seems like these weren’t particularly complex or technically adept multi-layer attacks, they were carried out via the most common avenue – SQL Injection<\/a>.<\/p>\n

In saying that though, they did yield a massive amount of data with some of the leaked databases providing over 30,000 records.<\/p>\n

Hacker collective Team GhostShell leaked a cache of more than one million user account records from 100 websites over the weekend.<\/p>\n

The group, which is affiliated with hacktivists Anonymous, claimed they broke into databases maintained by banks, US government agencies and consultancy firms to leak passwords and documents. Some of the pinched data includes credit histories from banks among other files, many of which were lifted from content management systems. Some of the breached databases each contained more than 30,000 records.<\/p>\n

An analysis of the hacks by security biz Imperva reveals that most of the breaches were pulled off using SQL injection attacks – simply tricking the servers into handing over a bit more information than they should. “Looking at the data dumps reveals the use of the tool SQLmap, one of two main SQL injection tools typically deployed by hackers,” the company’s researchers explained in a blog post.<\/p><\/blockquote>\n

It looks like they even used off the shelf software too, if you look at the dumps you can actually see some references to sqlmap<\/a> – which is a pretty powerful tool.<\/p>\n

You can check it out in the analysis by Imperva here:<\/p>\n

Analyzing the Team GhostShell Attacks<\/a><\/p>\n

It seems like all the apps attacked were PHP CMS type web applications, there’s no information if they were all using the same platform though.<\/p>\n