AntiSec: 77 law enforcement websites hit in mass attackby Steve Ragan - Jul 31 2011, 13:41
Just hours after the AntiSec raid was announced, the first leak appeared online. The leaked list focuses on the personal information of nearly 7,000 people. Included in the list are names, email addresses, home addresses, phone numbers, usernames, passwords, and Social Security Numbers.
The information was taken from the Missouri Online Training Academy database, located on mosheriffs.com, one of the 77 sites hit during the raid. In addition to the SSNs and other identifying information, the passwords are weak and appear to be self selected.
Unfortunately, with this level of information out in the public, those exposed by the leak are at serious risk of identity theft or massive account compromise online.
Early Sunday morning, the leaked data was removed from Pastebin.com, but the information is still available on the Web. Considering the other leaks that have appeared on Pastebin related to AntiSec, it is unknown why this single item was missing.
Shortly after the leak, Anonymous commented via Twitter, "Word is that we are sitting on more sensitive data than we can ever upload. Just a matter of selection now. Arrest us. We dare you."
We’ll update with more information as we get it.
In retaliation to the FBI’s actions against Anonymous, including several arrests, AntiSec supporters have targeted 77 law enforcement domains and walked away with everything on them. The data breach was simplified, according to one Anon, because all 77 domains were hosted on the same server.
Previously, AntiSec targeted Arizona police departments, leaking personal information and other sensitive data, in response to immigration laws passed by the state. This time however, the latest law enforcement raid by AntiSec is in response to actions taken by the FBI.
Earlier this month, the FBI served more than forty warrants on people alleged to be connected to Anonymous, resulting in the arrests of 14 people in the U.S. and two others overseas.
In all, 77 law enforcement domains were attacked, resulting in the loss of 5-10GB worth of sensitive documents. Some of the data lifted in the AntiSec raids includes training files, and the personal information (names, addresses, phone numbers, Social Security Numbers, usernames, and passwords) of more than 7,000 officers from dozens of police departments.
In addition, entire email spools, plus details on inmates and confidential informants, were also compromised. The information related to the inmates, if released, will be redacted. The confidential informants are on their own, a note outlining the raids explained.
“[The compromised data] also contained jail inmate databases and active warrant information, but we are redacting the name/address info to demonstrate how those facing the gun of the criminal injustice system are our comrades and not our adversaries. On the other hand, we will be making public name and contact information about informants who had the false impression that they would be able to ‘anonymously’ snitch in secrecy.”
In addition to promoting the latest AntiSec raid, the note also contained demands and a message to law enforcement.
“We demand prosecutors immediately drop all charges and investigations against all ‘Anonymous’ defendants,” the note said.
“To law enforcement: your bogus trumped-up charges against the Anonymous PayPal
LOIC attacks will not stick, nor will your intimidation tactics stop us from exposing your corruption. While many of the recent ‘Anonymous’ arrestees are completely innocent, there is no such thing as an innocent cop, and we will act accordingly.”
“To our hacker comrades: now is the time to unite and fight back against our common oppressors. Escalate attacks against government, corporate, law enforcement and military targets: destroy their systems and leak their private data.”
While there are plans to release data, an Anon close to the incident told us, there is no exact timeframe. How much of the data will be released is also unknown.
On Wednesday, Sheriff John Montgomery, of Baxter County, Arkansas, told local reporters that he wasn’t too troubled about any alleged security breach.
“I’m not overly concerned, simply because everything on the sheriff’s website is public information,” he said in an interview.
Sheriff Montgomery’s website is among the 77 recently targeted by AntiSec. In addition to public information, internal information was taken as well. His comments were given in response to questions about a warning issued by Brooks-Jeffrey Marketing, the firm suspected to be the breached host that housed all of the recently compromised sites on a single server.
Early last week, Brooks-Jeffrey Marketing told Gassville, AR, Mayor Jeff Braim, that the city’s website would be offline after receiving warning from the FBI. According to Braim, who relayed the details during a city council meeting, the FBI were investigating a “possible hacking plot” and they considered the threat credible.
In a statement, Shannon Brooks, BJM president, said “Late Monday, we noticed suspicious activity on one of our servers. We notified those clients that were affected and made the decision to take that specific server off line Tuesday. We are taking this opportunity to migrate those clients from that server to better, faster servers. We expect to be back online shortly.”
As of Saturday evening, baxtercountysheriff.com remains offline. A mirror of the site’s defacement by AntiSec is here.
Additionally, cityofgassville.org, was offline as well. It too is listed as one of the 77 sites targeted by AntiSec.
Given the recent actions by the FBI, it is possible that someone in custody, or someone who was questioned and had equipment seized, knew about the recent law enforcement raid in advance. But it’s clear that the FBI was tracking potential attacks just days after a nationwide sweep.
A spokesperson for the FBI was unavailable Saturday evening to address questions.