The UK Council for Graduate Education (ukcge.ac.uk) has been hacked by a hacker that goes by the name of “smitt3nz.” The attacker not only defaced the website, but also leaked information stolen from its databases.
The data leak which was uploaded to pastebin on the 1st comes with no messages or statements but does state the system is storing its passwords in clear text but the defacement states that their security wasn’t so tight.
The leaked information contains email addresses and plain text passwords of 636 users. Based off the defacement message, the hacker wanted to highlight the insecure website.
The message posted on the defaced site, the hacker simply wanted to show that the website wasn’t properly secured. "smitt3nz’s" Twitter account has been suspended shortly after he posted the link to the leaked data.
At the time of writing this article the UK Council for Graduate Education website still inaccessible.
Update:
Hackers are again hacked the UK Council for Graduate Education website and posted the new message on website about deleting all user credentials in their CRM as well as urging all the UKCGE staff to make sure they did not reuse the same password on other systems.
Hackers are posted message is:
The hacker has also offered to send them the patch if they ever get unbanned on twitter (@smitt3nz) and they have also stated that it might be possible for some one to change the hard coded payment addresses (paypal) to another in the source code but no financial or credit details was accessed in the breach.
The data leak which was uploaded to pastebin on the 1st comes with no messages or statements but does state the system is storing its passwords in clear text but the defacement states that their security wasn’t so tight.
The leaked information contains email addresses and plain text passwords of 636 users. Based off the defacement message, the hacker wanted to highlight the insecure website.
The message posted on the defaced site, the hacker simply wanted to show that the website wasn’t properly secured. "smitt3nz’s" Twitter account has been suspended shortly after he posted the link to the leaked data.
At the time of writing this article the UK Council for Graduate Education website still inaccessible.
Update:
Hackers are again hacked the UK Council for Graduate Education website and posted the new message on website about deleting all user credentials in their CRM as well as urging all the UKCGE staff to make sure they did not reuse the same password on other systems.
Hackers are posted message is:
LUL.. #2
In response, following recommendations from JANET all existing account details have been successfully deleted in our CRM systems. We urge all existing account holders to ensure that the existing combinations of username and password used through the UKCGE website are not employed through any other websites.
In response, following recommendations from JANET all existing account details have been successfully deleted in our CRM systems. We urge all existing account holders to ensure that the existing combinations of username and password used through the UKCGE website are not employed through any other websites.
…
Okay so they told you to do that.. but you haven’t issued a patch for the vuln in your site..?
DM me on twitt3r if that sh1t ever gets unbanned and i’ll hit you up with a patch
It is important to point out that all financial transactions made through the website are processed via PAYPAL. Therefore no credit card (or similar) details have been comprimised.
Okay so they told you to do that.. but you haven’t issued a patch for the vuln in your site..?
DM me on twitt3r if that sh1t ever gets unbanned and i’ll hit you up with a patch
It is important to point out that all financial transactions made through the website are processed via PAYPAL. Therefore no credit card (or similar) details have been comprimised.
Whilst this is true, what good is it if someone modifies the payment address in da s0urce?
gr33tz; smitt3nz , EyeSee , lollipop
The hacker has also offered to send them the patch if they ever get unbanned on twitter (@smitt3nz) and they have also stated that it might be possible for some one to change the hard coded payment addresses (paypal) to another in the source code but no financial or credit details was accessed in the breach.
Dear All,
ReplyDeleteWe are going to introduce you a new and exciting world of social network.
FUNBOOK
Join now for free and be a part of this fast growing online social community. Enjoy the new features at one place.
Click Here to Join
or
feel free to contact us HERE
Your precious feedback is highly appreciated
FONBOOK is free for life