search the site

Saturday, June 25, 2011

Hackers leak former British PM Tony Blair data

TeaMp0isoN releases what looks like former British Prime Minister Tony Blair's electronic address book.
 
Hackers today released what looks like personal information on former British Prime Minister Tony Blair, including the contents of his electronic address book, with contact data for members of Parliament and for what could be Blair's dentist and his mechanic.
A link to the data on the Pastebin Web site was sent out on Twitter from the account of "TeaMp0isoN" along with a message saying "Tony Blair should be locked up, he is a war criminal." Earlier in the day, the TeaMp0isoN account had featured a tweet that said the group was targeting Blair for his support of the war in Iraq.
The contact list appears to be from when Blair was prime minister and includes a phone number for 10 Downing Street. CNET dialed that number and talked to an unidentified representative from the current prime minister's office. That representative confirmed that the number was for 10 Downing Street but said the office had no comment on the matter. There was no immediate response to an e-mail sent to the address the office gave for Blair, who resigned as prime minister four years ago and was succeeded by Gordon Brown.
Meanwhile, hacker group LulzSec, which has claimed credit for hacks on Sony, the CIA, the U.S. Senate, and, last night, the Arizona Department of Public Safety, promised in a tweet today that it would be "releasing more goods on Monday!"
LulzSec and TeaMp0isoN have been in a public spat, claiming to have attacked each other's servers and threatening to expose rival members. On Wednesday, someone released information purportedly exposing the identity of a key member of LulzSec who goes by the nickname "Sabu."
TeaMp0isoN was described in a FoxNews.com article yesterday as a group of professional hackers linked to the Palestinian-friendly "Mujahideen Hacking Unit" that defaced Facebook in December. "We're here to show the world that (LulzSec are) nothing but a bunch of script kiddies," Hex0010, a 23-year-old member of TeaMp0isoN, told the Web site, using a derogatory phrase for inept hackers.
The attacks are just the latest in a recent wave of incidents that have left many Web sites defaced, much customer data exposed, and much corporate and government data leaked. View CNET's timeline of recent hacking events for details.
Earlier today, PBS.org, which was defaced in May by LulzSec, was targeted again by "Warv0x (AKA Kaihoe)," according to a Pastebin file. "This wasn't done for fame or fun, just proving LulzSec aren't as good as they think they are," the hacker said in a note on The Hacker News. "I haven't rooted the box or been up to crack the hashes, I'm just proving that most of their attacks are very lame and basic (i'm pretty sure and automated) SQL injections and further privilege escalation, which is just a matter of time."
A PBS.org spokeswoman confirmed to CNET in an e-mail that the site was hacked. "What we have seen is that one area of one Web site--the portraits area of the Web site Becoming American, was defaced," said Jan McNamara of PBS.org. "A very small number of PBS administrator usernames and encrypted passwords were exposed."
Also today, the Guardian released Internet Relay Chat logs that the newspaper said were leaked from a private LulzSec chat room. In the logs, Sabu warns others to be careful who they talk to about the group's activities. "You realize we smacked the FBI today," Sabu says in the logs. "This means everyone in here must remain extremely secure."
In those logs, there are a few brief references to "Ryan," but it's unclear what Ryan's role is or whether he's the same person as the 19-year-old Ryan Cleary who was arrested earlier this week in Essex, England, on computer charges. Cleary was charged Wednesday in connection with a series of distributed denial-of-service attacks, including one earlier this week on the Serious Organized Crime Agency in the U.K. that was organized by LulzSec and the Anonymous group as part of a campaign to target government and financial organizations.
LulzSec had said that Cleary operated one of the group's chat rooms on his IRC server but that he was not a key member of the group.
A hearing in the case was reportedly scheduled for Saturday morning.
Updated at 6:15 p.m. PT with PBS.org hack and 5:16 p.m. PT with TeamPoison background, LulzSec logs, background on arrest of Cleary.

No comments: