Hacker releases 100,000 Facebook log-in credentials
The hacker claims the details -- released in retaliation for hackers targeting Israel -- belong to Arabs
IDG News Service - A hacker who claims to act in defense of Israel has released 100,000 credentials of allegedly Arab users of Facebook in an ongoing row between Israeli and Arab hackers.
The hacker, who goes by the name Hannibal, posted the credentials in four parts on Pastebin on Saturday as well as making the details available on 14 file-sharing sites.
In a note introducing the data, the hacker claimed to have 30 million email account details, 10 million bank accounts and four million credit card accounts belonging to "Arabs from all over the world."
Hannibal appeared to propose a truce, as activity from hackers targeting Israel appears to have subsided in recent days, but the hacker vowed to come to Israel's defense if needed: "If they appear again, I again come to save Israel. Trust me. I'll always be around."
Emails sent to an address provided by Hannibal in the Pastebin data were rejected by the hosting provider.
Since Jan. 13, Hannibal has released several batches of email and Facebook log-in details. Facebook officials said last week of one of the releases that less than a third of the credentials were valid, and half were not associated with Facebook accounts.
"This does not represent a hack of Facebook or anyone's Facebook profiles," according to a statement.
Facebook said it validates every single log-in attempt to the site, whether the password is right or not, in order to scan for malicious activity.
Earlier this month, a hacker going by the name "oxOmar" released tens of thousands of credit card numbers of Israeli citizens. Israel's Banking Supervision Department later said that only 15,000 of the numbers were active.
Shortly after that release, someone going by the name Omer Cohen, or "0xOmer" on Twitter, released 400 credit card numbers and expiration dates belonging to Saudi Arabian cardholders. Omer Cohen did not publish the CVC, the three-digit code on the back of the cards, however, needed to conduct online purchases.
Send news tips and comments to email@example.com
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts