Vbg Hackers
Wednesday, 12 February 2014
Thursday, 9 January 2014
Computer at Japanese Monju Nuclear Power Plant infected with Malware
Reported by Sabari Selvan on Thursday, January 09, 2014 |
13 StumbleUpon0 Digg0 35
A computer at Japanese Monju Nuclear Power plant control room was recently found to have infected with a piece of virus.
The malware infection does not seems to be part of any kind of targeted attacks. The malware is said to have found its way into the system after one of the facility's employee updated a video playback program.
Sponsored Links
The machine in question is one of the eight computers in the control room, used by employees to file paperwork, according to Japan Today.
The server admin noticed an unusual behavior on January 2nd. According to enformable report, the infected system was accessed over 30 times in five days after the employee performed software update.
The infected machine is said to have stored many sensitive documents including employee data sheets, over 42,000 emails and training logs.
The server admin noticed an unusual behavior on January 2nd. According to enformable report, the infected system was accessed over 30 times in five days after the employee performed software update.
The infected machine is said to have stored many sensitive documents including employee data sheets, over 42,000 emails and training logs.
Computer at Japanese Monju Nuclear Power Plant infected with Malware
Reported by Sabari Selvan on Thursday, January 09, 2014 |
13 StumbleUpon0 Digg0 35
A computer at Japanese Monju Nuclear Power plant control room was recently found to have infected with a piece of virus.
The malware infection does not seems to be part of any kind of targeted attacks. The malware is said to have found its way into the system after one of the facility's employee updated a video playback program.
Sponsored Links
The machine in question is one of the eight computers in the control room, used by employees to file paperwork, according to Japan Today.
The server admin noticed an unusual behavior on January 2nd. According to enformable report, the infected system was accessed over 30 times in five days after the employee performed software update.
The infected machine is said to have stored many sensitive documents including employee data sheets, over 42,000 emails and training logs.
The server admin noticed an unusual behavior on January 2nd. According to enformable report, the infected system was accessed over 30 times in five days after the employee performed software update.
The infected machine is said to have stored many sensitive documents including employee data sheets, over 42,000 emails and training logs.
U.K Ministry of Defence Hacked by Nullcrew
The famous hacker group Nullcrew hacked the U.K Ministry of Defence
and leaked the details in pastebin. The attack was targeted earlier
today, announced in twitter.
"We should have thedatabase from the UK Ministry of Defense (mod.uk)
up tonight for you guys. #NullCrew #FuckTheSystem #Nov5" Tweet reads.
"UK Ministry of Defence will be dumped in a coupleof minutes.
Prepareyourselves."
After posting the above tweet, hackers posted the link to dump.
http://pastebin.com/vRFPQkzR
"Your webmaster made a terrible mistake... You may criticize us on the
simplicity ofthe vulnerability. But if you can get so much useful data
so easily, why wouldn't you? We hope that all governments and
organizations realize that#FuckTheSystem is definitely not a joke. We
hope that you have the decency to grasp theconcept of it. But hey...
You're the government right... Just some butthurt little fags. This
security just proves how much of a joke our governments are." the
hackers said in the paste.
According to hackers' report , they've have breached the site by
exploiting the SQL injection vulnerability.
The leak contains server , database details. It also contains login
credentials including user, password and email address.
Proof....
Posted: 05 Nov 2012 10:19 PM PST
http://www.ehackingnews.com/2012/11/uk-ministry-of-defence-hacked-by.html
The famous hacker group Nullcrew hacked the U.K Ministry of Defence
and leaked the details in pastebin. The attack was targeted earlier
today, announced in twitter.
"We should have thedatabase from the UK Ministry of Defense (mod.uk)
up tonight for you guys. #NullCrew #FuckTheSystem #Nov5" Tweet reads.
"UK Ministry of Defence will be dumped in a coupleof minutes.
Prepareyourselves."
After posting the above tweet, hackers posted the link to dump.
http://pastebin.com/vRFPQkzR
"Your webmaster made a terrible mistake... You may criticize us on the
simplicity ofthe vulnerability. But if you can get so much useful data
so easily, why wouldn't you? We hope that all governments and
organizations realize that#FuckTheSystem is definitely not a joke. We
hope that you have the decency to grasp theconcept of it. But hey...
You're the government right... Just some butthurt little fags. This
security just proves how much of a joke our governments are." the
hackers said in the paste.
According to hackers' report , they've have breached the site by
exploiting the SQL injection vulnerability.
The leak contains server , database details. It also contains login
credentials including user, password and email address.
Proof....
Posted: 05 Nov 2012 10:19 PM PST
http://www.ehackingnews.com/2012/11/uk-ministry-of-defence-hacked-by.html
Subscribe to:
Posts (Atom)