5 GB Data of Sri-Lankan Govt Dumped By Team T!g3R


Team T!g3R strikes again, this time the target is Sri Lankan cyber fence. w3bd3f4c3r, n3ll@!s4mur4!, r00t, burn3r, !nd4!nRuBuk, violence_$h@r0n (members of Team T!g3R) who conducted this operation. They have done data dump of many high profile site of srilanka including Srilankan Army, Port Authority, Business Online, Lawnet Govt, National Science Foundation, Sunday times News Paper and so on. 

  • SRILANKAN ARMY:-

WEBSITE : www.slpa.lk
Vulnerabile to SQLi
Dumped Database Link:- http://pastebin.com/ygfSmu3C

  • MICROFINANCE OF SRILANKA:-

WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/drBwfngj
LAWNET GOVERNMENT OF SRILANKA:-

Website : www.lawnet.lk
Vulnerable to SQL-i  
Dumped Database Link:- http://pastebin.com/p9YVkj4U



  • NATIONAL SCIENCE FOUNDATION  OF SRILANKA:-

Website : www.nsf.ac.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/htyxY8Dz
                         


  • SRILANKA PORT AUTHORITY:-
WEBSITE : www.slpa.lk
Vulnerabile to SQL-i
Dumped Database Link:-  http://pastebin.com/ygfSmu3C


  • LANKA BUISNESS ONLINE:-
WEBSITE : www.lbo.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/C4z7QEit


  • SUNDAY TIMES NEWS PAPER OF SRILANKA:-
Website : http://sundaytimes.lk
Vulnerable to SQL-i
Dumped Database Link:- http://pastebin.com/aTFWNgWj

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Database of Stanford University's Hacked By An0nym0us sn3Ak3r


The official website of Stanford University's Nanoelectronics Group is Vulnerable to SQL-i and its DB Hacked By An0nym0us sn3Ak3r. The hacker exposed many information like Db name, Tables, Column, user credentials, admin details and so on. 



Vulnerable Site:-  http://nano.stanford.edu/

Host IP: 171.67.216.22
Web Server: Apache
DB Server: MySQL
Column Count is 10
String Column is 2


User Credentials:-

User Name=superadmin
Password=93a76158cafcd6bd9227607a5f5bd8eaf36ac7d8
User Name=addcontent
Password=fd9b61ca989759ecb0cd0ae5298e2c61f8e0add7
User Name=hspwong
Password=4ba878ab4d1d19d3
User Name=mrlinPassword=f87f8271afa4e5c2380822d33d37f132c4c6675b

To See The hacked DB Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Team Ghost Exposed Secrete Documents of DOD, NATO, NSA, Home Land Security & Many More


The team "Ghosts" uploaded a .Zip file containing files from Government, Military, DOD, NSA, Homeland security, NATO and many more organizations. The download itself contained 27 PDF Files, 13 Microsoft Word Files, 1 ppt File and a Text file.
The text file contains 130+ login details  for a website that had been infiltrated an hour beforehand.
www.Westdorset.org.uk

The download contained information such as forms, Top secret cover sheets and restricted and classified information about the organisation.

To download the secrete file uploaded by  Ghost click Here

Twitter Page of Team Ghost:- https://twitter.com/BlackHatGhosts
FB Page of Team Ghost:- http://www.facebook.com/TeamGhosts

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Linux Repository Kernel.org Was Under Cyber Attack


Kernel.org, a site that distributes Linux source kernels, has suffered a breach of security according to a leaked email by Chief Administrator John Hawley. First noticed on August 28, it's believed multiple infected servers sat undetected for 17 days. Shortly after the leaked email went public, Kernel.org released a statement confirming intruders had gained root access to at least one server. The intruders reportedly gained access to the server with compromised user credentials, but it's unknown how they obtained root access from there.
Files belonging to SSH were modified and running live. A Trojan was also added to the start-up scripts and all user interactions were logged, possibly compromising usernames and passwords. The infected servers have been taken offline with backups made pending further investigation and full analysis on the code in Git. All servers will have full reinstalls and the respective authorities in Europe and the United States have been notified.
One major advantage in the case of Kernel.org is that the Git version control system is used to manage the entire development lifecycle of kernel packages. Each version of every package has its own cryptographically secure SHA-1 hash calculated, which changes as the package does. This creates a development history for each package, making it impossible to introduce changes without them being noticed.
Many will consider this attack to be a serious problem, but Kernel.org moved quickly to reassure everyone that repositories remained unaffected and they are working closely with the hundreds of users of kernel.org to change passwords and SSH keys.
They are also going to audit all security policies and make improvements if required to ensure this is a onetime event. The site was keen to note that it takes security seriously and is pursuing all avenues to find the attackers and prevent future infiltrations

The Leaked Email by Chief Administrator John Hawley:-

"...---------- Forwarded message ----------
From: J.H. <warthog9@kernel.org>
Date: 2011/8/29
Subject: [kernel.org users] [KORG] Master back-end break-in
To: users@kernel.org


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Afternoon Everyone,

As you can guess from the subject line, I've not had what many would
consider a "good" day.  Earlier today discovered a trojan existing on
HPA's personal colo machine, as well as hera.  Upon some investigation
there are a couple of kernel.org boxes, specifically hera and odin1,
with potential pre-cursors on demeter2, zeus1 and zeus2, that have been
hit by this.

As it stands right now, HPA is working on cleaning his box, and
I'm working on hera (odin1 and zeus1 are out of rotation still for other
reasons), mainly so that if one of us finds something of interest, we
can deal with it and compare notes on the other box.

Points of interest:

- - Break-in seems to have initially occurred no later than August 12th

- - Files belonging to ssh (openssh, openssh-server and openssh-clients)
were modified and running live.  These have been uninstalled and
removed, all processes were killed and known good copies were
reinstalled.  That said all users may wish to consider taking this
opportunity to change their passwords and update ssh keys (particularly
if you had an ssh private key on hera).  This seems to have occurred on
or around August 19th.

- - A trojan startup file was added to rc3.d

- - User interactions were logged, as well as some exploit code.  We have
retained this for now.

- - Trojan initially discovered due to the Xnest /dev/mem error message
w/o Xnest installed; have been seen on other systems.  It is unclear if
systems that exhibit this message are susceptible, compromised or not.
If you see this, and you don't have Xnest installed, please investigate.

- - It *appears* that 3.1-rc2 might have blocked the exploit injector, we
don't know if this is intentional or a side affect of another bugfix or
change.

- - System is being verified from backups, signatures, etc.  As of right
now things look correct, however we may take the system down soon to do
a full reinstall and for more invasive checking.

- - As a precaution a number of packages have been removed from the
system, if something was removed that you were using please let us know
so we can put it back.

- - At this time we do not know the vector that was used to get into the
systems, but the attackers had gained root access level privileges.

That's what we know right now, some of the recent instabilities may have
been caused by these intrusions, and we are looking into everything.

If you are on the box, keep an eye out, and if you see something please
let us know immediately.
Beyond that, verify your git trees and make sure things are correct.

- - John 'Warthog9' Hawley
Chief Kernel.org Administrator
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
Comment: Using GnuPG with Fedora - http://enigmail.mozdev.org/
iEYEARECAAYFAk5a5U0ACgkQ/E3kyWU9dif+1ACfYPlgq/keFrFO77AmQVduKGwx
TAcAnRAu6nHt74+5aC+fPeb8aT0hcy2K
=Semd.."

For More information Click Here
-News Source (TECH SPOT & Kernel.org)

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Construction Products Certification Hacked Personal Data Compromised

Construction Products Certification (http://www.cpcert.co.uk) hacked by The Ion of Team Black-listed hacked people’s login and public address  ,phone numbers, admin logins are exposed  .all the tables names are exposed and are leaked publicly entire database was dumped publicly.

Here are some screen shots submitted By the Hacker:-


To See the hacked DB Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerability Found By Zero on 2 Bangladeshi Govt. Website

I-frame  Vulnerability found By Zero on 2 Bangladeshi Govt. website. One is the official website of Supreme Court of Bangladesh & another is Digital Bangladesh.

Vulnerable Sites:-

www.digitalbangladesh.gov.bd
www.supremecourt.gov.bd

Supreme Court of Bangladesh:-



Digital Bangladesh:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

English Defence League (EDL) Hacked By TeaMp0isoN (Members Personal Information Leaked)


English Defence League (EDL) hacked & members personal information leaked by TeaMp0isoN. The official twitter of TeaMp0isoN twitted & took responsibility of the EDL hacking case.


After this phenomena EDL release a note by denying the Hacking:-

"We have not been hacked...
Due to the sheer weight of geniune traffic to this site and the public interest in the English Defence league we have had to suspend our normal website. Normal service will be resumed later today "

 
To See the Exposed Details Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...