• IP addresses are NOT logged in this forum so there's no point asking. Please note that this forum is full of homophobes, racists, lunatics, schizophrenics & absolute nut jobs with a smattering of geniuses, Chinese chauvinists, Moderate Muslims and last but not least a couple of "know-it-alls" constantly sprouting their dubious wisdom. If you believe that content generated by unsavory characters might cause you offense PLEASE LEAVE NOW! Sammyboy Admin and Staff are not responsible for your hurt feelings should you choose to read any of the content here.

    The OTHER forum is HERE so please stop asking.

2016 All Terrorists HUAT LIAO! FBI & Dept of Homeland Security fucked Big Time!

AhLeePaPa

Alfrescian
Loyal
Joined
Sep 17, 2008
Messages
174
Points
18
http://www.newsfactor.com/story.xhtml?story_id=020002FOOK28


Hacker Releases Data on 10K DHS Workers, Says FBI Is Next
By Jef Cozza / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
FEBRUARY
08
2016

Almost 10,000 Department of Homeland Security employees awoke this morning to find that their personal information had been stolen from the agency’s servers and leaked on the Internet. For his next trick, the same hacker said he'll release the personal details of 20,000 FBI staff members.

The information in the data dump includes names, job titles, e-mail addresses, and phone numbers. The attacker targeted not only DHS employees, but also included individuals listed as contractors for the agency. Other DHS staffers, such as analysts, special agents, and technicians, were also targeted.

Motivated by Palestinian Conflict

The person or group behind the hack goes by the handle @DotGovs on Twitter. The hacker posted screenshots that appeared to show him accessing a confidential Web page from the U.S. Department of Justice. One of the owners of the feed tweeted, “When will the US government realize we won't stop until they cut relations with Israel,” as a possible motive for the attack. The hacker also used the #FreePalestine hashtag in a number of tweets.

The hacker also claimed that the Justice Department only became aware of the breach in the last 24 hours, although the hack was executed a week ago. Both DHS and the Justice Department appeared silent on the attack, which comes at a particularly sensitive time for Homeland Security officials. The agency had hoped to generate positive publicity with news of its efforts to secure yesterday's Super Bowl festivities at Levi's Stadium in Santa Clara, Calif.

The attacker said he was able to gain access to the Justice Department’s intranet after first compromising a staff member’s e-mail address. Armed with that information, the hacker was able to get the rest of the authentication details by calling the appropriate department at the agency. The attacker claimed to be a new employee and asked for help.

The attack on DHS indicates that the rate of potentially severe hacks against the government have only been increasing, Gartner Inc. analyst Katell Thielemann told us.

"The OPM hack, which affected millions of people, is probably the most severe in recent memory in terms of reach and impact, but the release of thousands of DHS and FBI employee personnel should be of concern," she told us. "The exposure of this information could run the gamut from embarrassment and humiliation all the way to harassment and physical safety concerns for affected employees and their families. Many DHS and FBI personnel operate undercover, for instance. Exposing their identity could endanger their lives, undermine operations, and have a chilling effect on future recruitment."

Security Heads Make Big Targets

As bad as the leaks are, the hacker is claiming it could have been much worse. In interviews with media outlets, the person claiming responsibility said that while he only downloaded about 200 GB of data, he had access to a full terabyte, including credit card numbers and military e-mails. Unlike the employees' personal details, the hacker did not provide this information to media outlets for independent verification.

The federal government is attempting to make the shift from an “accredit and forget it” cyber-culture to one based on risk-based frameworks, according to Thielemann. "Most agencies are trying to close security holes in a patchwork of legacy systems," she said. "This is a huge undertaking, and it is happening in a massively complex federated infrastructure governed by slow-changing rules and policies."
 
http://www.wired.com/2016/02/hack-brief-fbi-and-dhs-are-targets-in-employee-info-hack/

Hack Brief: Hacker Leaks the Info of Thousands of FBI and DHS Employees


Last year, a hack of the US Office of Personnel Management exposed the personal information of millions of government employees. Now, Motherboard reports, a hacker has threatened another federal employee dump of a much smaller scale but potentially more sensitive target: the names, titles, and contact information of nearly 30,000 FBI and Department of Homeland Security workers.
The Hack

Motherboard first reported the hack on Sunday, after obtaining the data. Since then, the information of roughly several thousand DHS employees appears to have been released by anonymous sources. The 20,000 FBI employees appear not to have been exposed yet.

Update: The FBI information has now been leaked as well. Both dumps are accompanied by pro-Palestine slogans.

The hacker told Motherboard that he was able to access the files through the compromised email account of a Department of Justice employee. He claimed to have downloaded 200GB of files, out of 1TB total available to him. That would imply that the information that’s been leaked so far is just a small percentage of the total.
Who’s Affected

As of right now, the names, titles, email addresses, and phone numbers of 9,000 DHS employees have been made public, with 20,000 FBI employees at risk of exposure as well. The hacker told Motherboard that he also had some military emails and credit card numbers, but provided neither proof nor indication that he intended to release them.

The FBI employees nearly 35,000 people, meaning that more than half of the agency’s people would be at risk. It’s not clear if any of the 20,000 who are involved in the hack are in sensitive positions.
How Serious Is This?

The hack doesn’t impact you directly unless you work for one of the agencies involved, and even then it seems most likely to result mostly in annoyance.

What’s more serious is that these details were accessible in the first place, through seemingly not terribly sophisticated means. These are agencies that deal in highly sensitive information; if they can’t secure their digital doors, there’s no reason to think any branch of government can.

Then again, if even the director of the CIA can’t lock down his (AOL) email account, perhaps it’s wishful thinking that any other agency’s employees might fair better.
Go Back to Top. Skip To: Start of Article.
Skip Social. Skip to: Latest News.
Share this story on Facebook
Share this story on Twitter
Share this story on Pinterest
Share this story via Email

DHSFBIhack briefHackinghacks

Skip Social. Skip to: Latest News.

Share
Share
Tweet
Pin
Email

Author: Joseph Cox. Joseph Cox Security Date of Publication: 09.21.15.
09.21.15
Time of Publication: 11:50 am.
11:50 am

Apple Removes 300 Infected Apps from App Store -HIV GAY PHONE VIRUS

Apple has now removed over 300 pieces of software from the App Store, after malware that targeted developers managed to create infected iOS apps. On top of that, it looks like the apps are more dangerous to Apple customers than previously thought.

Several security companies have now banded together in the search for malicious iOS apps: Claud Xiao from PaloAlto Networks has reportedly discovered 39, Fox-IT also found a number of others, a representative told WIRED in an email. Many of those apps are popular in China, such as Railway 12306, used for purchasing train tickets, and a version of WeChat, a messaging app. Only the older version 6.2.5 is infected, whereas the app’s up-to-date version is clean.

However, it appears that some affected apps are also used by Apple customers in the United States. ‘CamCard’, an app for scanning and storing business cards, and which was a ‘Top Paid App’ in 2014, is also infected, according to Palo Alto Networks.

Originally, the malware was seen to be fairly innocuous: it could siphon off only small snippets of information such as a device’s ID, and the current time.

But according to findings from one researcher, and then built upon by Xiao, the infected apps are also capable of receiving commands from the attacker. These commands can apparently allow a hacker to read and write data to the victim’s clipboard, open specific URLs, or prompt a fake alert on the victim’s screen. Some of these could be used to steal passwords, Xiao claims.

Apple did not respond to multiple requests for comment, but company spokesperson Christine Monaghan told The Guardian in an email that “We’ve removed the apps from the app store that we know have been created with this counterfeit software,” and that “We are working with the developers to make sure they’re using the proper version of Xcode to rebuild their apps.”
 
https://www.rt.com/usa/331788-hacker-doj-fbi-doxxed/

Hacker posts info of 20K FBI employees, 9K DHS staff
Published time: 8 Feb, 2016 20:35
Edited time: 8 Feb, 2016 22:23
Get short URL
© Denis Balibouse
© Denis Balibouse / Reuters
Names and addresses of 20,000 FBI employees and over 9,000 Homeland Security workers were dumped on the internet by unknown hackers after they tricked their way into a Department of Justice computer.

Tweeting as @DotGovs, the hackers posted a link pointing to a plain-text post on CryptoBin listing names, job titles, work emails, phone numbers and the states for thousands of employees of the Department of Homeland Security (DHS) and FBI. The list includes computer specialists, procurement officers, budget analysts, directors and senior advisers.

20,000 FBI EMPLOYEES NAMES, TITLES, PHONE NUMBERS, EMAILS, COUNTRYhttps://t.co/c5mvY49P8S
password is lol#FreePalestine
— penis (@DotGovs) February 8, 2016

ALL https://t.co/JVNmAdiVAm EMPLOYEES (9,000) NAMES, TITLES, PHONE NUMBER, STATE, EMAILhttps://t.co/gv82WHUp5E#FreePalestine
pass is lol
— penis (@DotGovs) February 7, 2016

Several news outlets were contacted by the hackers on Sunday evening and given a preview of the data, including Vice’s Motherboard blog and FedScoop. According to the sites, the information in the leak was accurate.

how you like that huh @TheJusticeDept#FreePalestinepic.twitter.com/G37q6AWh23
— penis (@DotGovs) February 8, 2016

"We take these reports very seriously, however there is no indication at this time that there is any breach of sensitive or personally identifiable information," DHS spokesman S.Y. Lee said in a statement Monday morning.a

The hackers told Motherboard they accessed the information by compromising an email account of a Justice Department official. They used the email address to “social engineer” access to the DOJ intranet, calling technical support to give them a password.

“So I called up, told them I was new and I didn't understand how to get past [the portal],” one of the hackers told Motherboard. “They asked if I had a token code, I said no, they said ‘that's fine – just use our one’.”
Read more
CIA Director John Brennan © Yuri Gripas CIA chief's e-mail hacked, hackers with pro-Palestinian agenda claim responsibility

At that point, the hackers gained access to about a terabyte of data, and managed to download about 200 gigabytes.

“This is for Palestine, Ramallah, West Bank, Gaza, This is for the child that is searching for an answer,” the hackers said at the beginning of their CryptoBin post. Both the message and the method used in the hack resemble those of a different group of anonymous hackers that last year breached the private email accounts of CIA Director John Brennan and National Intelligence Director James Clapper.

Hit by a series of high-profile data breaches in recent years, the US government is demanding more cyber security funding. Last week, Defense Secretary Ash Carter requested nearly $7 billion for the Pentagon’s cyber operations budget in 2017, to “further DOD's network defenses… build more training ranges for our cyber warriors; and also develop cyber tools and infrastructure needed to provide offensive cyber options."

The Pentagon’s cyber budget for the current fiscal year is $5.5 billion.
 
US cyber-security has been breached numerous time. This would not have happened if the US had employed more Indian nationals to be their IT experts and programmers. Singapore has never once experienced such a serious breach in our cyber security, let alone numerous times like the US.

I would like to take this opportunity to thank IDA and other relevant government agencies for keeping Singapore safe from cyber-espionage and other IT-related hacking crimes.
 
US cyber-security has been breached numerous time. This would not have happened if the US had employed more Indian nationals to be their IT experts and programmers. Singapore has never once experienced such a serious breach in our cyber security, let alone numerous times like the US.

I would like to take this opportunity to thank IDA and other relevant government agencies for keeping Singapore safe from cyber-espionage and other IT-related hacking crimes.

PMO of idiot Loong kenna, ministries kenna, Singpass kenna, soon they will post data of all hacked PAP secrets, wikiLEAKed, and John Tan's nuke video.
 
Back
Top