Anonymous hacks Booz Allen, posts 90K military email addresses and passwords
IDG News Service - The Anonymous hacking group said Monday it had broken into military contractor Booz Allen Hamilton's network and posted 90,000 military e-mail addresses and passwords online.
Booz Allen isn't commenting. "As part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems," the company said via its Twitter feed.
In addition to the e-mail addresses, which Anonymous suggests expose members of the intelligence community, the group also posted other data it said could potentially offer access to other government agencies and contractors.
"We infiltrated a server on [Booz Allen's] network that basically had no security measures in place," Anonymous said in a statement, posted to the torrent site where it uploaded the data.
The group warned on Sunday that it planned new activity. Via the @anonymouSabu Twitter account, it wrote: "ATTN Intelligence community: Your contractors have failed you. Tomorrow is the beginning."
It also said there would be two releases of information on Monday.
Anonymous and another hacking group, LulzSec, have been attacking government and law enforcement targets for a couple of months as part of a campaign they call "Antisec." Anonymous broke into an Arizona police system and released e-mails from there. It also attacked Turkish government websites. Authorities in several countries, including Spain, the U.K. and Turkey, have arrested people they say are affiliated with Anonymous.
LulzSec has disbanded following member arrests. It had attacked networks of the U.S. Central Intelligence Agency, the U.S. Senate and the U.K.'s Serious Organized Crime Agency.
- Microsoft brushes off claim Xbox Live accounts were compromised
- Twitter aims to become safer with two-step sign-in
- Yahoo Japan says 22 million user IDs may have been stolen
- Payment card processors hacked in $45 million fraud
- The Onion explains how its Twitter account was hacked
- Name.com forces customers to reset passwords following security breach
- Systems manager arrested for hacking former employer's network
- Dutch bill would give police hacking powers
- After hack, LivingSocial tells 50M users to reset passwords
- Amazon looks to move security appliances to the cloud
- Google I/O 2013's Coolest Products and Services
- 10 Star Trek Technologies That are Almost Here
- 19 Generations of Computer Programmers
- 25 Must-Have Technologies for SMBs
- A walking tour: 33 questions to ask about your company's security
- 15 social media scams
- The 7 elements of a successful security awareness program
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Federal IT Innovation Caught in a Catch-22
- Fed resources shoring up old infrastructure, holding back new technologies.
- Harness IT -- An Introduction to Business Intelligence Solutions
- Learn the key selection criteria required to provide your organization with the capability to address structured data, unstructured data and mobile demands so...
- Business Intelligence Shows its Smarts
- Today's Business Intelligence (BI) tools provide a new way to think about data with self-service capabilities and user-friendly analytics that can be used...
- Proactive Planning for Big Data
- Big data is less about the terabytes and more about the query tools and business intelligence needed to make sense of massive amounts...
- Inquiry Spotlight: Consumer-Facing Identity
- The challenges of consumer-facing identity management, access management, and authentication differ in ways subtle and dramatic from those of the employee-facing variety. All Government IT White Papers
- Becoming An Analytics Driven Organization
- Join us on Tuesday, June 18, 2013, 11:00 AM EDT and learn how your agency can create an analytics culture that will enable...
- 3 Reasons Why Sepaton is the World's Fastest Backup Solution
- Leading analyst, Storage Switzerland learns how Sepaton backs up and deduplicates massive data volumes while maintaining the industry's fastest performance - all in...
- Enterprise File Sharing: All You Need to Know
- Security. Scalability. Control. These are just some of the many benefits of enterprise cloud file-sharing that you'll discover in this KnowledgeVault, packed with...
- Bridging HTTP and FTP with FileXpress Internet Server
- What if you could take an FTP server on your internal network, and allow external users (partners or customers) to securely access it...
- MFT and FileXpress - An Overview
- Business users and applications exchange files on a regular basis. File transfer is a core part of the flow of business activity. All Government IT Webcasts