Anonymous hacks Booz Allen, posts 90K military email addresses and passwords
IDG News Service - The Anonymous hacking group said Monday it had broken into military contractor Booz Allen Hamilton's network and posted 90,000 military e-mail addresses and passwords online.
Booz Allen isn't commenting. "As part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems," the company said via its Twitter feed.
In addition to the e-mail addresses, which Anonymous suggests expose members of the intelligence community, the group also posted other data it said could potentially offer access to other government agencies and contractors.
"We infiltrated a server on [Booz Allen's] network that basically had no security measures in place," Anonymous said in a statement, posted to the torrent site where it uploaded the data.
The group warned on Sunday that it planned new activity. Via the @anonymouSabu Twitter account, it wrote: "ATTN Intelligence community: Your contractors have failed you. Tomorrow is the beginning."
It also said there would be two releases of information on Monday.
Anonymous and another hacking group, LulzSec, have been attacking government and law enforcement targets for a couple of months as part of a campaign they call "Antisec." Anonymous broke into an Arizona police system and released e-mails from there. It also attacked Turkish government websites. Authorities in several countries, including Spain, the U.K. and Turkey, have arrested people they say are affiliated with Anonymous.
LulzSec has disbanded following member arrests. It had attacked networks of the U.S. Central Intelligence Agency, the U.S. Senate and the U.K.'s Serious Organized Crime Agency.
- Michaels breach exposes nearly 3M payment cards
- Teen nabbed in Heartbleed attack against Canadian tax site
- Heartbleed bug can expose private server encryption keys
- FTC can sue companies hit with data breaches, court says
- 5-year-old hacks Xbox, now he's a Microsoft 'security researcher'
- State AGs probe Experian subsidiary's data breach
- NSA sniffing prompts Yahoo to encrypt traffic between its data centers
- Banks withdraw data breach claim against Target
- Bank abandons place in class-action suit against Target, Trustwave
- Banks' suit in Target breach a 'wake-up call' for companies hiring PCI auditors
This state transportation department uses computer science students from a local university as programming interns, and everyone is happy with the arrangement -- until one intern learns how to bring down the mainframe.
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- Changing the Way Government Works: Four Technology Trends that Drive Down Costs and Increase Productivity
- This paper discusses four technology-based approaches to improving processes and increasing
productivity while driving down department and agency costs.
- Path Selection Infographic
- Path Selection Infographic
- Hyperconvergence Infographic
- A wide range of observers agree that data centers are now entering an era of "hyperconvergence" that will raise network traffic levels faster...
- Preparing Your Infrastructure for the Hyperconvergence Era
- From cloud computing and virtualization to mobility and unified communications, an array of innovative technologies is transforming today's data centers.
- How WAN Optimization Helps Enterprises Reduce Costs
- If you wanted to break down innovation into a tidy equation, it might go something like this: Technology + Connectivity = Productivity. Productivity... All Government IT White Papers
- Cloud Knowledge Vault Learn how your organization can benefit from the scalability, flexibility, and performance that the cloud offers through the short videos and other resources...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the...
- Endpoint Data Management: Protecting the Perimeter of the Internet of Things Not surprisingly, "Internet of Things" (IoT) and Big Data present new challenges AND opportunities for enterprise IT. Teams need to harness, secure and...
- All Government IT Webcasts