Say It Aint So! Ghostbin Set To Close Permanently May 2019

Tis a sad day in internet history indeed. This comes as Ghostbin‘s founder/developer, Dustin Howett, has publicly announced that Ghostbin will be closing forever after May 2019 – theoretically any day now. As is featured in a new banner appearing on the header of all Ghostbin postings, the service explains how “Ghostbin will be shutting down in May 2019. Until then, all newly-created pastes will expire in 48 hours. If you’d like an archive of your pastes, go here..

Archive Your Posts: https://ghostbin.com/session

However, if you are a regular reader of my website, the news shouldn’t necessarily come as much of a surprise. At two points in the past I have interviewed Mr. Howett here for Rogue Media Labs, and both times hes hinted that this day might soon be coming. For example, in an interview on February 17th 2019, Howett stated that “I hate running Ghostbin.” Explaining that “I spend hundreds of dollars a year and open myself up to significant legal risk to support a website that brings me no joy. Like: I started Ghostbin because I wanted there to be a place for iPhone jailbreak developers to share code with each other. That’s it. There isn’t an overarching goal related to fighting for freedom or openness of information or anything. I have to spend hours policing the content that goes up so the freakin’ sherrif’s department of some random city doesn’t subpoena me for some stupid nonsense.

This of course came less than two months after Howett shutdown his severs for the better part of a week before Christmas, later explaining on Twitter how…

There is no doubt that Ghostbin will be sorrily missed by the international hacking, leaking and online activism community, which has used Ghostbin as the de facto go-to location/service of choice to post/share nearly all of their data over the years. Ironically though, this is also exactly why the service will now be closing. For now, I suppose all that’s left to say is Rest In Peace Ghostbin, you were a good little copy and paste service – the best one of your time! You will be missed – salute!

No photo description available.

Conocimientos Libres of CiberGuerra Colombia Releases Leaks & Vulnerabilities of 11 Websites Across Colombia

Earlier this evening I came across a massive round of leaks dumped online by a South American hacker known as “Conocimientos Libres” on April 3rd 2019. What’s particularly interesting about the leak is that the hackers behind them claim to have carried out their operation in retaliation for what they call “false independence” offered to them by their Government.  While the hacker could not be reached for comment, I assume their operation steamed as the result of two recent political developments inside the country.

The first would be the fact that Ivan Duque recently attempted, but ultimately failed to assassinate the President of Venezuela – Nicolas Maduro. If not this, then surely they are referring to President Ivan Duques’s recent decision to overturn/veto portions of peace treaties signed with para-military groups, agreements which have brought the country increased levels of prosperity, growth and stability over the last several years.

Full Leak In Its Entirety:

1 > Sitio Web Bogota Hacked:

[+] https://ghostbin.com/paste/ygtqo
[+] https://ghostbin.com/paste/d48az

2 > Sitio Web Eseisabu Hacked:

[+] https://ghostbin.com/paste/yg3p7

3 > Sitio Web Sedtolima Hacked:

[+] https://ghostbin.com/paste/orx7r

4 > Sitio Web Dane Hacked:

[+] https://ghostbin.com/paste/tef6n

5 > Sitio Web amvcolombia Hacked:

[+] https://ghostbin.com/paste/or8qb

6 > Sitio Web esemorenoyclavijo Hacked:

[+] https://ghostbin.com/paste/mkgxj

7 > Sitio web minagricultura Hacked:

[+] https://ghostbin.com/paste/nzc2x

8 > Sitio Web mineducacion Hacked:

[+] https://ghostbin.com/paste/ed6rd
[+] https://ghostbin.com/paste/ed6rd/raw
[+] https://ghostbin.com/paste/kasje
[+] https://ghostbin.com/paste/kasje/raw

9 > Sitio Web educacioninicialtolima Hacked:

[+] https://ghostbin.com/paste/nxz5z
[+] https://ghostbin.com/paste/nxz5z/raw

10 > Sitio Web hsrespinal Hacked:

[+] https://ghostbin.com/paste/amz8r
[+] https://ghostbin.com/paste/amz8r/raw

11 > Sitio Web cavasa Hacked:

[+] https://ghostbin.com/paste/a8wgg
[+] https://ghostbin.com/paste/a8wgg/raw

Follow Up: Highlights from First Annual April Lulz Day 2019

On March 31st 2019, I published an article advertising “April Lulz Day 2019,”  an international hacking operation to be launched on April 1st 2019 on behalf of international LulzSec affiliates worldwide. Therefore, it only seems right to do a follow up article here today, chronicling all of the “festivities” associated with the operation – you’re welcome @TheInternet. While I’m certain I did not uncover them all, below is a list of hacks, leaks and defaces from April 1st – at least that I was able to find.

So, what were the highlights you ask!? Ohh, I don’t know, nothing major, “only” about 16 websites were crashed via DDoS attack, 5 websites had their databases hacked and leaked online, 28 websites were defaced, at least 500 Twitter accounts were closed and over 1,000 Facebook accounts were hacked – 😏. Below you can see the full run down, attributed to the sources behind them. All sites marked with “hxxp” are websites crashed via DDoS attacks.

LulzSec Argentina (@LulzSeguridad):

hxxp://elmetroonline.com.ar/
hxxp://ccs.com.ar/
hxxp://amcham.org.eg/
hxxp://gov.ua/
hxxp://dak.gov.ua/

Quilmes Encendido Oeste Wifi Passwords Leak: https://pastebin.com/raw/UNk0E21u

LulzSec Kurdistan (@LulzSecKu):

List of 27 Websites Defaced 4/01/2019: https://pastebin.com/JfHwAT02
Deface Mirror of 27 Websites Hacked/Defaced: https://mirror-h.org/search/hacker/30891/

Target: hxxp://borde.com.tr/
Deface: http://borde.com.tr/lulzsecku/

List of 500 Twitter Accounts Taken Down: https://pastebin.com/GbA1fjTM

Pinoy LulzSec (@PinoyLulzSec__):

hxxp://depedzn.net/
hxxp://depedlacarlota.com/
hxxp://uphsl.edu.ph/
hxxp://uphsl.edu.ph/
hxxp://depedlacarlota.com/
hxxp://depedzn.net/

Target: hxxp://bookhub.ph/
Database Leak: https://ghostbin.com/paste/5jqzn

+250 Hacked Facebook Account Logins: https://pastebin.com/gX7809Ag
Additional Facebook Leaks Part 1: https://textuploader.com/15y98
Additional Facebook Leaks Part 2: https://textuploader.com/15y0a

Polytech University of Phillipines: hxxps://www.pup.edu.ph/taguig/
Database Download: https://anonfiles.com/p6NaR2W4me/PUPTAGUIG_SQL
Download Backup: https://www.datafilehost.com/d/c7d4716e

Confidential Doc Stolen from Philippines Army: https://uploadfiles.io/82mtc

Lorian Synaro (@LorianSynaro):

hxxp://uofk.edu/
hxxp://alintibaha.net/
hxxp://akhbarelyoum.net/
hxxp://assayha.net/
hxxp://almeghar.com/

Miscellaneous:

750 Facebook Accounts Hijacked – ClownSec: https://pastebin.com/raw/peCbG4Wf

Target: hxxp://presidencia.gob.sv/
Deface: http://multimedia.presidencia.gob.sv/files/backup/index.html

Hazard Analysis & Critical Control Points/Análise de Perigos Hacked by Mr. Joker aka “Error Toxic”

Least week, March 22nd 2019, a hacker going by the name of “Mr. Joker” posted a data leak effecting the Hazard Analysis & Critical Control Points/Análise (HACCAP) de Perigos, Brasil – essentially a food and safety administration similar in many ways to the Food and Drug Administration of the United States. At the present moment in time not much is known about the hacker or their methodology/rationale, but their Twitter timeline was created a little less than 2 weeks ago and is full of 11 Tweets tied to various hacks, leaks and exploits effecting websites all over the world.

What we do know about this particular hack is that Mr. Joker was able to breach the site via SQL Injection (SQLi) granting him full access to the websites back-end. Moreover, I only covered their hack/leak of the HACCAP today because it effects a Government organization, exposing the name, email, passwords and addresses of 197 personnel members employed by the organization. You can learn more about the hacker and their leaks through the Twitter timeline provided below.

Full Raw Leak: https://ghostbin.com/paste/yvasx

https://twitter.com/ErrorToxic3/status/1109038091522723840

#OpBabyElephants: Hackers Publish Updated Email List of Animal Abusers/Traffickers from Asia To Africa

Earlier this morning I came across an updated listing affiliated with “Operation Baby Elephants” (#OpBabyElephants), an Anonymous operation designed to raise awareness on behalf of Elephant trafficking/smuggling out of Africa and into Eastern powers such as China, as well as hold those behind the trade of these animals accountable for their actions. To date, Anonymous has already hacked the National University of Science & Technology in Zimbabwe and released a detailed list of email addresses, subdomains, mail servers and DNS servers attached to different parties known to participated in Elephant trade/trafficking. Today’s release can be seen as an extension of those attacks.

Dated March 13th 2019, Anonymous hackers have published a new and updated/revised list of 631 email targets affiliated with Elephant trafficking/trade out of Africa, and are urging member so of the public to copy, paste and spam bomb them let them know how you feel about this issue. Other activists are asking members the international public to sign a petition banning the impending sale of 35 baby elephants to China in the near future. To date, over 113,000 have already signed the petition – with an initial goal of 120,000. You can find the revised email list and access to the petition below.

In a message attached to the release, the hackers stated:

Greeting citizens of the Internet Web, We are Anonymous and this is #OpBabyElephants.

This year plans by the government of Zimbabwe are to export as many as 35 baby elephants to China. The cruelty of the capture of baby elephants from their families in the wild has been revealed in disturbing photos videos secretly taken in Zimbabwe. These captures are usually kept as secret as possible. Therefore, we want to turn light on this issue. Here you have a huge list of mails all related to elephants business, parks and .govs. Please us it to express your disappointment.

Brothers and sisters of Anonymous. We ask that you stand along side us.

We are Anonymous.
We Do Not Forgive.
We Do Not Forget.
Expect Us.

Learn More – #OpBabyElephants: https://roguemedia.co/?s=elephants&x=0&y=0
Original Email List: https://ghostbin.com/paste/ypqp6
Updated/Revised Email List: https://ghostbin.com/paste/9cku5
Sign The Petition: https://www.thepetitionsite.com/402/323/338/zimbabwe-stole-35-baby-elephants-from-the-wild-and-is-about-to-send-them-to-china/?taf_id=61894407&cid=twitter#bbfb=912062708

https://twitter.com/YESFUCKYOUTOO/status/1107899636738637825

#OpVenezuela: International Hackers Team Up As The Onslaught Against Maduro’s Government Continues Into The Weekend

Over the course of the last 24 hours or so different hackers and hacking groups from all around the world appear to have come together in a coordinated effort to launch a massive round of cyber attacks against the Venezuelan Government. The attacks themselves are being carried out under the banner of “Operation Venezuela” (#OpVenezuela), an international hacking campaign largely attributed to the Anonymous Hacker Collective, originally launched in retaliation for Venezuelan President Maduro’s abysmal human rights record and brutal treatment of students and protesters alike throughout the recent past.

Ergo

Starting on the night of March 1st 2019, “Ergo” of the Brasilian based hacking group known as “Pryzraky” began launching a series of DDoS attacks against the Bolivarian Army of the Bolivarian Republic of Venezuela and Bolivarian Agency for Space Activities, attached to the Ministry of Popular Power for University Education, Science and Technology. The attacks themselves were carried out using Ergo‘s very own custom made botnet code-named “Poseidon,” which is quickly becoming infamous for taking down various website worldwide ever since first being introduced to the public just a few weeks ago.

In a message attached to the attack, Ergo left behind a message for the Bolivarian Army reading “F*ck You! You failed with this nation, we are on the population side. Pryzraky is here to help Venezuelans.
Site’s #TangoDown’d:

Ejército Bolivariano de la República Bolivariana: hxxp://ejercito.mil.ve/
Agencia Bolivariana para Actividades Espaciales: hxxp://abae.gob.ve/

Al1ne3737

Al1ne3737” on the other hand, another member of Pryzraky, managed to hack the websites of 3 South American television stations and networks, dumping the contents of their databases and/or vulnerabilities online. For example, through the leaked information provided below you can find the login credentials of 8 administrators belonging to TV NaGaragem, the names, user names, email addresses, telephone numbers and passwords of 255 registered users of TV Caiçara, as well as the SQL Injection vulnerabilities effecting the website of Sky TV.

Folha de Alphaville: hxxp://sk.tv.br/
NaGaragemTV: hxxp://nagaragem.tv.br/
TV Caicara – Audiovisual Brasileiro Independente: hxxp://tvcaicara.tv.br/

Raw Data Leak: https://pastebin.com/raw/WZqEvHC0
Data Download 54.15 KB): https://anonfile.com/Y4u8A7v1b4/hackeddates_txt

PopTart

Another member of Pryzraky, “PopTart” has claimed responsibility for a DDoS attack effecting the Ministry of People’s Power of the Office of the President – presumably via Layer 7 DDos Attack, their primary attack style of choice. While the attack was originally launched close to 24 hours ago at the time of the release of this article, March 3rd 2019, though the site is back online, it’s still functioning abnormally slow.

Ministerio del Poder Popular del Despacho de la Presidencia: hxxp://presidencia.gob.ve/

Prince

Prince” on the other hand is an independent hacker working under the general umbrella of Anonymous, claiming an attack on the website of Venezuela’s Book of Opportunities for Studies – which was still down at the time of this article. This is also the second such hack/leak effecting this website over the course of the last week alone, adding to an entirely separate data leak released to the public on February 28th 2019.

Libro de Oportunidades de Estudios: hxxp://loeu.opsu.gob.ve/

Original Leak: https://ghostbin.com/paste/2z6j4
Leak Backup: https://pastebin.com/raw/TEtFCQ3K

https://twitter.com/oprince_wood/status/1101614066538303495

#OpSudan: Sudan Airways Pnwed by Black Water Security, Sites Entire Email Archive Dumped Online

Image may contain: night

In a massive data dump posted online this morning, March 2nd 2019, an independent group of hackers going by the name of “Black Water Security” (BlackWaterSec) claimed credit for a comprehensive hack and leak of Sudan Airways, the countries singe largest national airline service. According to the groups social media profile, they describe themselves as “a small private intelligence firm working to combat terrorism domestic and foreign, as well as conducting counter-intelligence operations.” However, they appear to have stepped outside their normal realm with this particular hack, specifically just to join in with the international hacking operation known as “Operation Sudan” (#OpSudan).

Contained within the leak are the contents of the airlines entire email archive, including names, email addresses, titles/positions and password necessary to access the accounts of every registered user of the site – of which there are literally over 1,400. However, it must be noted that the hackers did not release every single email from these accounts individually, this would have taken potentially Terabytes worth of memory to backup, rather, the hackers merely dumped the credentials necessary to access every single one of the airlines internal emails.

Target: hxxp://sudanair.com
Original Leak: https://ghostbin.com/paste/4qqhb
Leak Backup: https://pastebin.com/raw/KE8pcREf
Database Download (430.26 KB): https://anonfile.com/kaf9B9v7bd/KE8pcREf_txt

In other news related to #OpSudan, “Lorian Synaro” announced this morning that Anonymous hackers have officially taken down the website belonging office of the President (Omar al-Bashir) for one week straight at this point – lulz. Similarly, the website belonging to Sudan’s Ministry of Defense has once again been taken down this weekend, adding to an ongoing series of outages effecting the website dating back to December 2018.

Exclusive: Understanding Recent Changes To Ghostbin’s Service & Servers

Internet users may or may not have noticed it at the time, but a couple of weeks ago Ghostbin servers were down globally for the better part of 48 hours. In addition to this, over the course of the last several days and weeks, Ghostbin‘s service has begun behaving in new and unexpected ways it never has before. For example, many recently uploaded paste-ings seem to be getting taken down almost as fast as they’ve been put up, and countless older postings have mysteriously started disappearing. Researching the incidents a little further, it appears as though the problem traces back to internal server/service updates currently being installed by Dustin Howett – Ghostbin’s original owner and founder.

In a statement posted to Twitter on December 28th 2018, roughly 3 days following a major service blackout effecting the website over the days leading up to Christmas, Dustin Howett explained how “Ghostbin will be shutting down, or changing drastically in scope, in February 2019. In the next few weeks, I’ll roll out a session archival feature and restrict all new pastes to a 48-hour expiration. There may be a period during which the service is available, but read-only.” This development was particularly interesting to note because back on December 25th 2018, in statements to Rogue Media Labs, Howett explained how the blackout effecting his service only lasted so long because he had run out of disk space for storage and that he “hated running” it – perhaps indicating that something like this was inevitably going to happen.

In further statements to Rogue Media Labs dated February 16th 2019, Howett went on to re-affirm how “I hate running Ghostbin.” Explaining that “ I spend hundreds of dollars a year and open myself up to significant legal risk to support a website that brings me no joy. Like: I started Ghostbin because I wanted there to be a place for iPhone jailbreak developers to share code with each other. That’s it. There isn’t an overarching goal related to fighting for freedom or openness of information or anything. I have to spend hours policing the content that goes up so the freakin’ sherrif’s department of some random city doesn’t subpoena me for some stupid nonsense.” Adding that “I’m not planning on selling the domain, though; at least not for a while.” Instead, Howett has begun rolling out/implementing all the changes listed above to begin mitigating or minimizing his future risks.

A Brief History

For those of you whom might be unfamiliar, Ghostbin was founded I believe sometime back in 2015 as side project while Howett was still in college, and the service took off right from the start – particularly amongst the Anonymous Hacker Collective. In fact, while I was a reporter working for AnonHQ News in the Spring of 2016 I remember conducting an interview with Howett, a conversation during which he explained how he had created the service as a side project of sorts, after essentially being un-impressed by other copy and paste services like it on the market. What has always made Ghostbin stand out from its competition is the fact that it looks bad-ass, offered no sign up page, featured no advertisements and its servers were never designed to log or record the IP Addresses of its visitors/posters. This also made the service 100% Anonymous, which is why it has always such a devout/cult following within various hacking circles.

Read More: About Ghostbin’s Founding: https://ghostbin.com/about

Presumably though, this is in all likelihood the same reason why Howett has now soured on his service, because it has essentially become a conduit for black hat hackers to perpetuate illegal acts. For obvious reasons, this is also something which can be troublesome, especially given the fact that Howett is now a leading industry professional/developer working for American tech giant Microsoft. I’d also have to imagine that continuously getting asked to take down certain postings by law enforcement officials and/or Government agencies and/or victims of cyber attacks can get pretty annoying, especially when you have full time commitments elsewhere.

As I’ve told Mr. Howett, I almost feel responsible in a way for the burden he now bears, because dating back to 2015 I’ve been encouraging members of Anonymous and international hackers alike to use Ghostbin for just about everything – something which has indubitably resulted in countless headaches for Howett over the years. So, considering that Howett has no ambitions to sell his domain, service or platform in the future, I would now like to begin using my platform to start advising people to make the switch away from Ghostbin and to other alternative copy and paste services. In other words, stop using Ghostbin for any/all illegally obtained information.

In the future, I advise any/all of my sources/contacts to begin posting leaks or releases through Hastebin. If you do not want to use Hastebin then simply make a new posting on Pastebin, download the text file and then upload said file to AnonFile. This will ensure that your data will always be safe and cant be taken down. If you would like to learn more about the value of copy and paste services, as well as a small list of some of the top alternatives to Ghostbin, I invite you to read the following article…

Learn More – Copy & Paste Services: https://roguesecuritylabs.ltd/copy-paste-services/

Mexico’s Secretaría de Cultura – Programa Anual de Proyectos Culturales & Paraguay’s Servicio Nacional de Saneamiento Ambiental Hacked by Mizaru

In a momentary comeback to the hacking scene after a brief time away, yesterday morning, February 23rd 2019, “Mizaru” of the international hacking group known as Pryzraky announced two separate hacks and leaks effecting the Governments of Mexico and Paraguay. The first attack targeted the Annual Program of Cultural Projects website of the Secretary of Culture in Mexico, and the second the National Service of Environmental Sanitation (SENASA) in Paraguay.

In two separate postings online, Mizaru provided the pathways of various SQL Injections which can be utilized to hack the websites and thus expose its data. In the leak attached to the Secretary of Culture in Mexico at least, Mizaru also leaked the contents of the websites “users database,” exposing the usernames, emails, passwords, telephone numbers and more on approximately 23 site administrators/users. You can find access to both leaks via the information provided below.

Secretaría de Cultura – Programa Anual de Proyectos Culturales:

Alvo: hxxp://apoyospef.gob.mx
Leak: https://ghostbin.com/paste/cn87x
Leak Backup: https://www.hastebin.com/ajaleqehed.sql

Servicio Nacional de Saneamiento Ambiental:

Alvo: hxxp://senasa.gov.py
Leak: https://www.hastebin.com/aluqekibez.sql
Leak Backup: https://ghostbin.com/paste/vzk8y

https://twitter.com/s_Mizaru/status/1099291305472069632

https://twitter.com/s_Mizaru/status/1099224822662467584

Universidade de Pancasila, Palestrante do Universidade de Pancasila & Awnings and Locksmiths Brasil Hacked, Databases Leaked Online

To close out the month of January, hackers a rogue group of hackers belonging to different groups including Artr0n, Al1ne3737, Jvuice e Dr4uz (BackboneSquad), Crimination e Lexy (TDA-Team), Malokin, Clust3r and CYB3R S4GE carried out a series of hacks and leaks effecting the University of Pencasila, the official website of the speaker of the University of Pencasila and Awnings and Locksmiths in BH, a local manufacturer of metallic structures inside Brasil.

The main hack of the Universidade de Pancasila on January 29th 2019 revealed sensitive information compromising the websites administrators, exposing the email address and password of 3 site administrators granting the hackers with root access over the back end of the website. The second hack of one of the Universities sub-domains, the Palestrante do Universidade de Pancasila, was a little more in depth – exposing root admin login information to the sites primary database, along with the title, usernames and passwords of 73 others, used to access other databases affiliated with the website.

Target: univpancasila.ac.id
Database:

Sub-Target: hxxp://dosen.univpancasila.ac.id
Database:

The last hack of Awnings and Locksmiths in BH took place on January 31st, in which the names, ID numbers and area codes of various customers were hacked. The site itself was also defaced.

Target: hxxp://serralheriaembh.com.br/
Data Leak: https://ghostbin.com/paste/cun5f
Deface: https://tinyurl.com/y7syyezs

Additionally, in a message attached to the hack/leak the hackers stated:

The Chronicles of the Cybernetic Sage Act VI 

“The Illustrious” “Hocus Pocus!” Houdini drowned in the mire. “What a pity, no!?” would be the speech of those responsible. They know that I am behind them, enlightened enough to be able to walk in the dark without attracting attention. I wonder why? Was it my false light? Was it, perhaps, a reflection of what Lucifer says he is to these pagans? I Do not know. I only know that I know nothing, just like the philosophers of ancient Greece, on planet Earth. I will not rest until I have drowned the heads of the false kings in the mire that they have given to the people. ”

All that is above, is below, as well as which is below, is above. Just 0’s and 1’s scattered on all sides. Why are so many cars stopped, operating in static?

No photo description available.

CYB3R S4GE of Backbone Squad Hacks 6 Companies Across India, Portugal & UK, Releasing Poems With Each Leak

No photo description available.

Over the course of the weekend, January 26th – 28th 2019, a hacker going by the name of “CYB3R S4GE” of the Brasilian based hacking group “Backbone Squad” announced the hack and leak of 6 businesses across Portugal, India and the United Kingdom. Not only did Cyb3r S4ge manage to leak the root login information to 5 of the 6 websites, but they also took the hacks as an opportunity to publish what appears to be personally written poems accompanying each data leak – something which is certainly unique. Originally written in Portuguese, I have done my best to translate each of the poems into English, but may not have been able to do them all true justice.

The hacked companies in question include Cheaptrade Lojas de Informática (Portugal), Niraj Polymers Private LTD. (India), Orthoflex Medisys (India), A.K. Industries (India), Nemichem Industries (India) and Clark Brownscombe Chartered Accountants – located in the United Kingdom. You can read more or browse through each of the leaks for yourself via the information provided below.

Cheaptrade Lojas de Informática

The hack/leak of Cheaptrade Lojas de Informática includes the ID numbers and email accounts of 12,886 customers, along with the login credentials (usernames and passwords) of two site administrators, granting access to all of the websites online databases. In a message attached to the leak, Cyb3r S4g3 stated:

Behold, I walk on this dirt road, seeking the one who will stone and roll that razor I call the sword. For what purpose will I use this sword? I still do not know. I just hope I can cut the stolen diamonds. I can not forget to try and cut off the head of a “President” who idolizes himself as if he were a God. False Messiah? Perhaps. I just hope you stop trying to be God, because that’s not your job. This is not who you really are. Mr. Smith, could you sharpen my blade, please?

All that is above, is below, as well as that which is below, is above. Just 0’s and 1’s scattered on all sides. Why are so many cars stopped, operating in static mode?

Raw Data Leak:

Niraj Polymers Private LTD

The hack/leak of Niraj Polymers Private LTD includes the root login user name and password of a singular site administrator, granting access to various files and designs published/produced by the company. In a message attached to the leak, Cyb3r S4g3 stated:

That glare which once gnawed through the sky can now hardly be identified. We all thought it could’ve been a simple comet, meteor, or something that could wreak havoc, but behold, one of us came out of it, without even telling us where they came from …

Raw Data Leak:

Orthoflex Medisys

The hack/leak of Orthoflex Medisys once again revealed the root login username and password of a singular website administrator, granting access to all files and file logs uploaded onto the website. In a message attached to the leak, Cyb3r S4g3 stated:

The Chronicles of the Cybernetic Sage Act IV – The Path.

9 houses forward, 2 houses back, as if playing an old board game. No wonder some of us are all living the same way. This all just sounds like some “Crazy Race,” with each competitors fighting to see who knocks down the other one first as we advance towards the finished line. It’s such a shame to the pureness of gold produced by our Earth shining light on another Earth, following us in the same path towards the collective ends of out time.

Raw Data Leak:

A.K. Industries

The hack/leak of A.K. Industries was a little less exciting, offering nothing for anyone to really grab onto or access for themselves. Rather, the leaked information mirrors the folders that only the hackers were able to see/access for themselves – essentially comprising of various media files and folders published by the website. In a message attached to the leak, Cyb3r S4g3 stated:

Love vincit omnia – That was the phrase that perhaps many believed would the salvation of mankind a long time. It’s sad how human beings have become deaf to the point they can not longer listen to their inner selves. It’s incredible that so many human beings have become blind to the truth that shows itself right in front of their faces. That’s because I did not mention the mud played cruelly and fraudulently by Vale … Anyway … Only time will tell when to play my cards on the table.

Raw Data Leak:

Nemichem Industries

Most notably, the last hack of Nemichem Industries revealed the root login email address and password of one site administrator, granting access to all the files contained within the sites databases. The leak also features the login user name, email address, contact information and password of 16 website users/clients. In a message attached to the leak, Cyb3r S4ge stated:

The Chronicles of the Cybernetic Sage Act II – The longing.

“There are those out there who are expecting a revolution to come from those sitting behind machines, yearning for light in these dark times. Do not be a mere byte amid statistical data ,computed by a system you yourself have not created. All that is my boredom. My enemies can see my light without understanding its color. They try to decipher a code that is not SHA-256, but rather something ethereal. Do not try and decipher what only silence can interpret.

Raw Data Leak:

Clark Brownscombe Chartered Accountants

And finally, the hack/leak of Clark Brownscombe Chartered Accountants exposed the login username and password of a singular website administrator, granting full access to the websites back-end. In a message attached to the leak, Cyb3r S4ge stated:

A sound from the forest floor echoes from across a dark, empty, silent road. I think to myself: where does such melody come from? Songs about revolution in a kingdom where there has never been a possibility of hope of self-improvement. They spoiled us. There are those who say that the new is right, knowing full well how old the argument is, as well as how wrong their actions were. Why do we need all of this? Who wants to see us dead? It’s important to open your eyes …

India’s Jamal Mohamed College Hacked by New World Hackers, Student Email Archives Dumped Online

Two nights ago, January 25th 2019, a member of the New World Hackers group going by the name of “Mizaru” claimed responsibility for the hack of Jamal Hohamed College in Khajanagar, Tiruchirappalli – India. Comprising of over 3,200 lines, this is one of the largest data leaks I have ever seen Mizaru publish. This is also because it contains the personal email messages/exchanges of hundreds of students, as well as a full database of university staff members – including their full names, positions, emails and contact information. On top of having their emails exposed, the hackers also managed to uncover and release even more student data, including their course catalogs, contact information and home addresses.

Browsing through the leak, Mizaru also made it quite clear that they were originally able to compromise the website via SQL Injection, granting administrator level access/privileges over the entire site.

Target: hxxps://www.jmc.edu/
Data Leak: https://ghostbin.com/paste/96eg8

https://twitter.com/MZR_h4x0r/status/1088943913161932800