Hackers release one million bank, web account details

Project HellFire posts wide range of records taken from banks, government, consultancy databases

Tags: Cyber crime
  • E-Mail
Hackers release one million bank, web account details Project HellFire is intended as a protest against banks and politicians, according to hacking group Team GhostShell.
By  Mark Sutton Published  August 29, 2012

A hacking group has released one million records and accounts from banks, government agencies and other sources.

The group, calling itself Team GhostShell posted compromised databases from a Chinese mainframe, a US stock exchange mainframe and access points to three or four Department of Homeland Security servers among other sources.

Security analysts have confirmed that the data released includes at least 30,000 records, with data including credit histories from banks, administrator login information, usernames and passwords and files from content management systems.

Security company Imperva said that a lot of the data appeared to have been taken using SQL injection attacks.

In a statement accompanying the records, Team GhostShell said that the ‘Project HellFire' release was its "final form of protest this summer against the banks, politicians and for all the fallen hackers this year".

2397 days ago
Khawar Nehal

About time people realized that bad security practices is not a good risk management method.
If any cracker can do it, then imagine what a real hacker can do.
SQL injection attacks do not require a hacker, just a common cracker. Even teenagers can pull such stuff off.
We need more awareness and action on security by using more reliable methods.

Regards,
Khawar Nehal
971-55-639-8386
http://dubai-computer-services.com

2399 days ago
Vinod Mehra

Sad but reality bites. We need one stringent and uniform legal framework applicable across the globe to combat such crime. On the flip side hackers reflect how fragile & vulnerable our e-business is ?

www.vinodkmehra.com

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code