As many as 1,000 usernames and passwords were leaked on the Internet after Google Talk was allegedly hacked by a Team Alad33n member nicknamed Galad33n, according to a Pastebin dump. Several other attackers defaced a couple of Fox News websites and a NASA subdomain in what appear to be separate security breaches.
â€œGoogle has left it’s [SIC] data unsecured, some passwords are not encrypted, some are, scroll down to check,â€ Galad33n said in the SQL database dump. More than 100 passwords contained only simple characters such as â€œ315475,â€ while other passwords simply repeated the usernames.
At the same time, a NASA subdomain was apparently hacked by GreenRage (â€œGr33nRageâ€), who allegedly managed to log in to the American Jet Propulsion Laboratory. To keep police away, the attacker swore he didnâ€™t download any sensitive data.
GreenRage proudly claims his Italian roots, recommending himself by the following motto: â€œI’m an hacker [SIC], No I’m not a criminal and Yes I’m Better then youâ€¦â€ Recently, he began a busy autumn with attacks on the Ukrainian intelligence service and several Italian websites.
Fox News was also recently targeted by a group calling itself StRoNiX. More than 10 hackers participated in the attacks that defaced two of the corporationâ€™s radio and mobile websites. At the time of writing, foxnews2go.mobi was still offline, greeting the attackers in a plain text message. They didnâ€™t disclose any motive for the hacking, but the companyâ€™s conservative vision has led to criticism from many Americans, though its broadcasting programs score high audiences.
In July, 2011, Fox Newsâ€™ Twitter account was hacked and bogus messages about Barrack Obamaâ€™s death were posted on the micro-blogging platform. “BREAKING NEWS: @BarackObama assassinated, 2 gunshot wounds have proved too much,” the Foxnewspolitics feed stated. The company was also hacked last year in May, when a Lulz member stole personal information from 73,000 applicants for the American X Factor.
All product and company names mentioned herein are for identification purposes only and are the property of, and may be trademarks of, their respective owners.
This article is based on the technical information provided courtesy of Sabina Datcu, Bitdefender E-threat Researcher.