Guy Fawkes Day, November 5th 2018 – LulzSec Italy announced credit a string of hacks and leaks targeting numerous systems and websites across Italy.
In celebration of Guy Fawkes Day, November 5th 2018, LulzSec Italy announced credit for a massive string of hacks and leaks targeting numerous systems and websites across Italy. Included in the breaches were Italy’s National Research Center, The Institute for Education Technologies, the ILIESI Institute for the European Intellectual Lexicon, National Mining Office for Hydrocarbons and Geo-resources, Ministry of Economic Development, State Police Association, Fratelli D’Italia, Lega Nord Trentino, Partito Democratico Siena, TV Trentino, Technapoli Equitalia, State Archives S.I.A.S., Italian Military Personnel and National Association of Professional Educators.
Exposed in the Hack:
National Research Center
38 Databases Total: https://ghostbin.com/paste/3b54x
Login information for 37 administrators, including full names, username, password and email: https://ghostbin.com/paste/a5og7/raw
11 Usernames, Passwords & Emails for Database eSG: https://ghostbin.com/paste/wuo32/raw
110 Usernames, Passwords & Emails for Database exe: https://ghostbin.com/paste/avbkc/raw
40 Usernames, Passwords & Emails for Database exe2: https://ghostbin.com/paste/4r9hb/raw
41 Names & emails in ENHANCE datbase: https://ghostbin.com/paste/mo698/raw
91 Names & Emails in PERSONALE database: https://ghostbin.com/paste/46wsg/raw
1 Username for Database artico: https://ghostbin.com/paste/8ox25/raw
88 Login Usernames, User-Emails & Passwords in iTreasure Database: https://ghostbin.com/paste/rnw8v/raw
1 Username and Password In Database itd_cp: https://ghostbin.com/paste/kazwa/raw
12 Full Names, User Names, Emails & Passwords In Database DEL_GB: https://ghostbin.com/paste/6gc2t/raw
National Research Center’s Public Relations Office
6 Databases Total: https://ghostbin.com/paste/br6dz/raw
119 Director Names, Emails, Phone Numbers & Web Addresses: https://ghostbin.com/paste/m2qqt/raw
20 Entries in Database URP: https://ghostbin.com/paste/padtr/raw
6 Usernames & Passwords for Database URP3: https://ghostbin.com/paste/bvgo5/raw
The ILIESI Institute for the European Intellectual Lexicon
53 Databases Total: https://ghostbin.com/paste/8f8cx/raw
21 Usernames, ID’s & Passwords: https://ghostbin.com/paste/hghno/raw
National Mining Office for Hydrocarbons & Geo-resources
Hackers were able to obtain 97 un-encrypted passwords, emails, telephone numbers, virtual hosts.
Database Available Here: https://privatebin.net/?5a86dad981f2d6f9#Ukj5nmvQIC1kLX1edpGFeC/wioRCvFb7ZmzTA9moe5I=
Ministry of Economic Development
Database: Microsoft_Access_masterdb | Providencal Names & Codes: https://privatebin.net/?a4a7de0e8cb245fc#6/d78r8LZy/alRQy3bxWrtyUL5BYbVuD+Q1m8IsbSqQ=
MassaCarrara Web Archives
Administrator Username & Password To Access Archive: https://privatebin.net/?15ef871304a0afbb#Kab64MBuAfUsbF3KFqmTFe+oVRgwplgDCN3j4J7SphQ=
State Archive of Palermo
Archive Administrative Usernames & Password: https://privatebin.net/?60a9f630e84d80cd#s6C3Nc3ShoWmnRKk9OwyFUqcFGAFBFVBzkFbgwETtds=
State Police Association
Hackers were unable to obtain the administrator logins, including username, email and password for access, uncovering the personal information of active duty police officers, including identifiable information such as their emails, social profiles, addresses, telephone numbers and account passwords.
1,348 Logins Including Emails & Passwords: https://privatebin.net/?66aec26235951cc4#zKzlhUGg7ocCScrpDt5CoUUUKSPeg+sizdZIWjxcQIk=
MySQL Database Download 1: https://anonfile.com/e3d44bkbbc/126.96.36.199_new_zip
MySQL Database Download 2: https://anonfile.com/371b2ak7b8/csv_zip
Lega Nord Trentino
23 ID’s Full Names & Emails: https://privatebin.net/?ac1fe0253ec5c246#Ugm1LH48BhQHRQww1Lyhz2Kde6dnKQLUsjsCnmIdoE8=
Partito Democratico Siena
10 User Names, Emails & Logins – Including Administrators: https://privatebin.net/?1a64142b69fd878e#9rFxpJ6SU4+4/0VHiY/RJuZpeJ8CZ/1XfuZDoRkRttM=
Administrator Username & Login for SQL Database: https://privatebin.net/?8ea9f6164459e30c#IagLjHmq5SMtVDKVqU9LreqAyyLQLIG22Mb4Qow+p1E=
Technapoli Database Equitalia
Login Usernames & Passwords: https://privatebin.net/?203a23eda7af9f45#duOcGV3ddonatzdwS1OP/2J9XOhJPqUGqJkpLYpmUe4=
Database Download: https://anonfile.com/CfE8X2jdb3/PrivateBin_txt
State Archives S.I.A.S.
20,430 Entries – Including User ID’s, Usernames, Full Names, Emails & Passwords: https://privatebin.net/?15c4f79c65b535e8#4DgeRlqU70w4WOe005a/zUWv/fcI+ulNyGSCDg4zKhw=
Close to 2,000 Names, Surnames, Emails, Passwords: https://privatebin.net/?f2c74c12c80ce9c6#NDF1vtOG/OrgWlUYkJIVGcgVnyY/mknfybdNaTtrEGg=
National Association of Professional Educators
2,200 Usernames, ID’s, Passwords & IP Addresses: https://privatebin.net/?6318b912efe082f9#9Nd4K/49a9vTVQ0nbWmhPM7PRRN5Ls+UNv5sybOLGeQ=
About the Author: Brian Dunn
Brian Dunn is a writer & researcher formally working as a content specialist for AnonHQ throughout 2015-2016. Today Brian Dunn owns and operates Rogue Security Labs, a small-time online security service and Rogue Media Labs, a news/media startup attempting to change the way people read & consume cyber news/education.
(Security Affairs – LulzSec Italy, hacktivism)
The post Guy Fawkes Day – LulzSec Italy hit numerous organizations in Italy appeared first on Security Affairs.