Working with two other groups, MidasBank and OphiusLab, the hackers purportedly breached "WallStreet, CIA Services, MIT, Consulting Firms, Political Advisors, Security Companies, Corporations, Weapon's Dealers, Laboratories, Internet Hosting Services, Academics, Banks, Police Departments, Aviation, The Navy, Stocks Exchange, Bonds Exchange, Markets, Emirates Organizations, Various Businesses, Hedge Funds, Estate Agencies, Public Affairs, Robotics" in what they say is the team's "final form of protest this summer against the banks, politicians and for all the fallen hackers this year."
The records contain usernames, real names, email addresses, passwords, and more.
According to the group's statement, they are also offering access points to other hacker crews, and they include:
1. Six billion databases from a chinese mainframe full of chinese & japanese technology. It's very possible that it has from other countries as well, we haven't checked them all for obvious reasons.
2. Over 105 billion databases to a US stockexchange mainframe/s. It's very possible that the actual number is over 1 trillion, I wasn't prepared the first time and it gave me a memory error after 105 when it tried to add another digit. This job will require you to have at least 1TB available.
3. Access-points to 3-4 different servers belonging to the Department of Homeland Security. The sensitive information isn't that great but it may be good for street cred.
Whether the leaked information has really been extracted from the stated companies remains to be seen. According to Softpedia, who checked some of the leaked login credentials, they seem to be legitimate.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.