[ISN] Hackers steal passwords from military dating site

From: InfoSec News <alerts_at_private>
Date: Tue, 27 Mar 2012 02:07:30 -0500 (CDT)
http://news.cnet.com/8301-1009_3-57404815-83/hackers-steal-passwords-from-military-dating-site

By Elinor Mills
Security
CNET News
March 26, 2012

Hackers broke into the database for a military dating Web site and stole 
passwords, e-mail addresses, and other information from nearly 171,000 
accounts, according to a post on the Pastebin site this weekend:

"The website http://www.militarysingles.com/ was recently closed day ago 
or so, so we dumped email db," the hackers said in their post. "There 
are emails such as @us.army.mil ; @carney.navy.mil ; 
@greatlakes.cnet.navy.mil ; @microsoft.com ; etc.."

So-called "data dumps" are a common occurrence, but what makes this one 
notable is that the group is using the names "LulzSec" and "LulzSec 
Reborn." The FBI announced the arrest three weeks ago of alleged key 
members of the LulzSec group of hackers who had taunted government 
agents and harassed government contractors and other corporations by 
attacking their sites and stealing data since last year. The group was 
reportedly brought down by one of their own, known as "Sabu," who had 
apparently been working as an informant since last summer when he 
pleaded guilty to computer hacking conspiracy and other charges.

The group took credit for attacks on sites belonging to Sony, PBS.org, 
the U.S. Senate, CIA, Arizona sheriffs, and others before announcing 
last June that they were calling it quits following a 50-day hacking 
spree. Their retirement was short lived though, as hackers using the 
LulzSec name continued their seige on law enforcement and corporate 
sites.

[...]


______________________________________________________________________________
Certified Ethical Hacker and CISSP training with Expanding Security gives
the best training and support.  Get a free live class invite weekly.  Best
program, best price. www.ExpandingSecurity.com/PainPill
Received on Tue Mar 27 2012 - 00:07:30 PDT

This archive was generated by hypermail 2.2.0 : Tue Mar 27 2012 - 00:12:06 PDT