Anonymous Releases 90,000 Military Email Addresses

Military email addresses, passwords, and other data from contractor Booz Allen Hamilton are exposed by hacker group Anonymous

Hacker group Anonymous continued an assault on government contractors Monday as it released 90,0000 military email addresses, passwords and some other data from military contractor Booz Allen Hamilton.

The group released a 190MB torrent, which eWEEK said includes "login information of personnel from US CENTCOM, SOCOM, the Marine Corps, Air Force facilities, Department of Homeland Security, Department of State and other private sector contractors."

Anonymous, which got a little clever with its seafaring references, said it was shocked at the lack of security on one of the company's servers.

"So in this line of work you'd expect them to sail the seven proxseas with a state- of-the-art battleship, right? Well you may be as surprised as we were when we found their vessel being a puny wooden barge," the group said on The Pirate Bay.

The group said it ran into basically "no security" on one of the company's servers and were able to lift the data, delete four gigabytes of source code and found information on other systems to attack.

It was the group's second attack on government contractors within a week.

Other Attacks

On July 8, the group claimed to have "laid nuclear waste" to IT contractor IRC Federal by defacing the company's website (Ars Technica has a good report on how it was done); "dropping" its databases and private emails and "owning their pathetic windows box."

Although the actions are extreme, Anonymous has been called a group of hackers with a cause. That is, instead of breaking into systems for financial gain, they go after targets to make a point.

Recently, the group defaced Arizona Police websites and released data to protest the state's tough immigration laws. In June the group went after Turkish government websites to protest a new internet user filtering scheme. It has also announced plans to promote an affiliated political party for people who have similar goals.

Join the CSO newsletter!

Error: Please check your email address.

Tags the pirate baysecurity

More about Strategy&

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Paul Suarez

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts