2 million stolen passwords for Facebook, Twitter, Google, Yahoo and others leaked online

Security experts have uncovered a trove of some 2 million stolen passwords to websites including Facebook, Google, Twitter and Yahoo from internet users across the globe.
passsResearchers with Trustwave’s SpiderLabs said they discovered the credentials while investigating a server in the Netherlands that cybercriminals use to control a massive network of compromised computers known as the “Pony botnet.”

The company said that it has reported its findings to the largest of more than 90,000 websites and internet service providers whose customers’ credentials it had found on the server.

The data includes more than 3,26,000 Facebook accounts, some 60,000 Google accounts, more than 59,000 Yahoo accounts and nearly 22,000 Twitter accounts, according to SpiderLabs. Victims’ were from the United States, Germany, Singapore and Thailand, among other countries.

Representatives for Facebook and Twitter said the companies have reset the passwords of affected users. A Google spokeswoman declined comment. Yahoo representatives could not be reached.

SpiderLabs said it has contacted authorities in the Netherlands and asked them to take down the Pony botnet server.

An analysis posted on the SpiderLabs blog showed that the most-common password in the set was “123456,” which was used in nearly 16,000 accounts. Other commonly used credentials included “password,” “admin,” “123″ and “1.”

Graham Cluley, an independent security expert, said it is extremely common for people to use such simple passwords and also re-use them on multiple accounts, even though they are extremely easy to crack.

“People are using very dumb passwords. They are totally useless,” he said.

About these ads

BSNL telecom server hacked by Anonymous Group

BSNL telecom server hacked by Anonymous Group against Section 66A of IT Act

The Indian chapter of the hacking collective Anonymous has hacked the website of the largest state run telecom services provider in the country, the Bharatiya Sanchar Nigam Limited (BSNL). The hack was done in order to protest against the section 66A of the IT act, a law that is concerned with internet censorship and content regulation due to which a cartoonist named Aseem Trivedi was arrested on charges of sedition a while back by the Indian authorities when he put caricatures regarding the constitution and corruption in a rally. The company which is the fourth largest telecom provider and the biggest fixed telephony provider in India was hacked todayafternoon and the website was defaced. The BSNL website was last hacked in 2011 by a Pakistani hacker. Anonymous, which does not have a record of being active in India, rose to prominence when it hacked the Reliance Communications server earlier this year.

The homepage of the website was hacked and defaced with the message ” Hacked by Anonymous India, support Aseem trivedi (cartoonist) and alok dixit on the hunger strike, remove IT Act 66a, databases of all 250 bsnl site has been deleted………….Do not think of BACKUP” and showed an image of Aseem Trivedi being arrested by the police.

BSNL telecom server hacked by Anonymous Group

BSNL telecom server hacked by Anonymous Group

The hackers further claimed that they had hacked all the sites under BSNL and deleted their databases. To prove their claims, the hackers pasted the dump file of all the sites on pastebin. Upon analysis of the dump file, it can easily be observed that the level of security on the sites is really not up to the mark and is quite pathetic, and many sites had passwords such as “password123”, “password”, “vpt123”, “enquiry999” were being used. Such easy passwords can be bruteforced by hackers in minutes and this gave the hackers easy access to their sites and this carelessness has been criticized by one and all. The site has returned to  normal level of functioning at the time of writing.

 The Section 66A of the IT act is a law that provisions punishment for sending offensive messages through any communication medium or service and a censorship on any information offensive or menacing in character which causes annoyance, inconvenience, hatred etc. by making use of a communication device or a computer. The law also places a punishment on deceptive or offensive emails and messages and all of the above mentioned offenses can be given an imprisonment of up to 3 years with fine.

The Anonymous have urged all to support them and Aseem Trivedi in their fight against Internet censorship so that the government is forced to roll back the controversial law. The website of the Union IT Minister Kapil Sibal was also hacked last month by Anonymous India in regard with the issue of internet censorship.

The protests against censorship of the Internet in India has been gaining momentum in India with many experts and well known personalities criticizing it and terming it as an oppressor of the right to freedom of expression and speech and this incident will surely rouse the government.

45000 WordPress blogs hacked

45000 WordPress blogs hacked on 2nd day of Spam campaign

The Internet has provided us a lot of opportunities at company level and entrepreneur level. E-commerce is providing a number of different ways to start and carry on of our businesses at various scales. These may include various ways like marketing, sales, money transfer etc.  through which we can be successful businessman. But along with these advantages, the internet has another side.  This side sometimes may become very serious threat to not only our business but also to our personal lives. And this side includes the risk of security threat cerebrate with working with e-commerce.

45000 WordPress blogs hacked on 2nd day of Spam campaign

45000 WordPress blogs hacked on 2nd day of Spam campaign

One of these threats has just been exemplified by the latest news of hacking 45000 wordpress accounts last week.  And this happened on the second day of spam campaign. The idea which hackers are using is simple. They provide you referral links on your word press website with such a verbiage which we cannot ignore and we click on the link. Followings are few examples of such links:

Make 500$ each day while sitting at home or I am getting paid with some handsome amount or make 200$ for each survey or money making websites.

The problem is that these links make such a good offer to the website visitors that it becomes certain that they will be clicking on this link. However, once a user will be clicking on this link it will take him to some other website and that website will be having another such link where user will be asked to register him or sign up on the website with his email id. Now once the user will be signed up on the website he will be getting an email with the wording like “You are invited to participate…”
with an additional option of “Claim my spot” link. At this point of time user is 75% trap in the phishing. Once user will be clicking on the link name “Claim my spot” user will be taken to another phishing website with a lot of offerings like “Earn extra money by uploading videos etc.

So through this full spam system about 45000 accounts have been hacked in a single day and yet no step has been taken by wordpress organization for fighting these scam scandals. We hope that soon some proactive measure will be taken by wordpress organization in the favour of their users and accounts. WordPress should send mails to the account holder to warn them about such kind of scams.
But until the wordpress does not take any action it will be solely depend on the users who have accounts on the wordpress. They should not be click on such kind of links. They should understand that nothing come in free and these greedy taglines are not true. One more protective measure which can be taken is to spread awareness against such kind of phishing scams. And the best way of doing is the internet itself. So we have to use internet to save internet from security threats. Spread information on social networks, spread information in emails, and talk about this with each other.  It does not matter if you are acompany or an individual you should approach online security very seriously. It will not only make you feel safer but will also protects people who visit.


Google Ireland and Yahoo Domains Hijacked

Irish websites Google.ie and Yahoo.ie went offline on Tuesday afternoon after their DNS servers were apparently hijacked to point to those of a third party, resulting in visitors being redirected to an ‘allegedly fraudulent’ address – farahatz.net. That site has now been taken offline, but it is not known whether the site could have been created with malicious intent.

Google Ireland and Yahoo Domains Hijacked

Google Ireland and Yahoo Domains Hijacked

A short note on the homepage of the IE Domain Registry said the move followed a “security incident on Tuesday 9th October, involving two high profile .ie domains that has warranted further investigation and some precautionary actions on the part of the IEDR.” The IE Domain Registry have requested assistance from the Garda Bureau of Fraud Investigation.

There was an unauthorised access to one registrar’s account [MarkMonitor] which resulted in the change to the DNS nameserver records for the two .ie domains. The IEDR worked with the registrar to ensure that the nameserver records were reset and corrected promptly.

Google Ireland and Yahoo Domains Hijacked

Google Ireland and Yahoo Domains Hijacked

Serious questions are being raised about how this breach occurred. Security experts have suggested that the login details for the IEDR registrar’s console may have been ‘socially engineered’

eMarkmonitor, the company which is listed as having registered google.ie on Google’s behalf, is also responsible for the registration of the Irish domain names for the likes of eBay, Microsoft, Yahoo and PayPal. None of those sites appeared to have been affected.

100k IEEE site Plain-Text Passwords found on Public FTP

Researcher Finds 100k IEEE.org Passwords Stored in Plain-Text on Public FTP Server

The Institute of Electrical and Electronics Engineers (IEEE) stored usernames and passwords for its users in a plain-text file on a publically accessible server, a Romanian computer scientist has claimed.

A plaintext file containing nearly 100,000 credentials were accessible on an IEEE.Org FTP server for at least one month before it was discovered on Sept. 18, Radu Drăgușin, a teaching assistant in the computer science department at the University of Copenhagen, Denmark, wrote on the IEEElog.com site Tuesday. The file contained users who were employees at companies such as Apple, Google, IBM, Oracle, and Samsung, as well as researchers from NASA, Stanford University, and other institutions, Dragusin wrote.

100k IEEE site Plain-Text Passwords found on Public FTP

100k IEEE site Plain-Text Passwords found on Public FTP

In addition to exposing username and passwords for IEEE members, the FTP server contained the ieee.org Website logs and visitor activity log for spectrum.ieee.org, Dragusin said. It appears the IEEE Web administrators “failed to restrict access” to theWeb server logs for both sites, allowing anyone to view the contents. Every Web request to the Web sites, or more than 376 million HTTP requests, were recorded in those files, Dragusin wrote.

Web server logs should never be publicly accessible as the files generally contain information that can be used to identify users and correlate their browsing activity. It appears that IEEE has closed that security hole, as the files are no longer available.

“If leaving an FTP directory containing 100GB of logs publicly open could be a simple mistake in setting access permissions, keeping both usernames and passwords in plaintext is much more troublesome,” Dragusin wrote.

Security experts have stressed time and time again that best practices call for storing salted cryptographic hashes of passwords, using an algorithm that hasn’t already been cracked. For a professional association which includes computer science professionals and publishes security publications, keeping passwords in plaintext, and then storing them in the same location as the server logs is a colossal, and baffling, mistake to make.

It’s not known at this time whether the file was accessed before Dragusin found it. If someone else got to the file first, those users are at risk for spear phishing attacks or other targeted campaigns. If the IEEE has access logs for its FTP server, the organizations would be able to determine the extent of the damage, Dragusin speculated.

According to Dragusin’s Twitter and Google+ posts, IEEE has yet to notify users, but the organization had posted a note to its website Tuesday afternoon, acknowledging a “security incident”.

100k IEEE site Plain-Text Passwords found on Public FTP

100k IEEE site Plain-Text Passwords found on Public FTP

“We have conducted a thorough investigation and the issue has been addressed and resolved. We are in the process of notifying those who may have been affected,” the IEEE wrote in the statement.

“It would be reasonable to assume, that an organization publishing leading security-focused publications, would value the privacy of its members, and be proactive in keeping their data secure,” Dragusin wrote.

Dragusin analyzed the raw data to figure out where the users were based, what email domains they were using, and common passwords. His analysis of common passwords was particularly disappointing. The top five most popular passwords in the IEEE file turned out to be “123456,” “ieee2012,” “12345678,” “123456789,” and “password. Considering many of IEEE members are security professionals and the organization has worked on various encryption and key management standards, the lack of password sophistication is worrisome.

There’s one positive thing to note, however, since it appears that a majority of the users are using unique passwords. It appears that the top five passwords are being used by only one percent of the affected users, and the top 18 passwords were used by less than two percent of users, according to Dragusin’s analysis. IEEE has become aware of an incident regarding inadvertent access to unencrypted log files containing user IDs and passwords.

Ethical Hackers

What is Hacking and Who is the Hacker ?

Hacking is considered a crime and a hacker a guy sitting in his garage doing miracles with mouse clicks. Taking down websites, stealing secret govt. information. Ripping people off their email and bank accounts.

” A hacker is someone who can make a computer do what he wants whether the computer wants to or not. “



A few years ago I also believed this and thought of hacking as bad and every hacker a computer criminal. At first, “hacker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do. Later it became associated with computer vandals intent on harming systems and this is where it stands today.

The word “Hacker” is subject to a long standing definition controversy.

Types of Hackers

1) Hobbyist Hackers – They are people who hack for fun and they make computer’s do new stuff. They do not want loss or destruction of information. They use hardware and software (programming language’s) to do their work.

Acc. to Wikipedia ”Hacker is a person who heavily modifies the software or hardware of their own computer system. It includes building, rebuilding, modifying, and creating software or electronic hardware, either to make it better, faster, to give it added features or to make it do something it was never intended to do.”

An excellent example of hobbyist hacking was the “Blue Box”, it was created by the Co-founder of Apple Inc. – Steve Wozniak. The Blue Box was a small electronic device which could place free long distance phone calls. Blue Box led to the term “Phreaking” which is Phone + Freak. They were primarily used by pranksters while others used it solely to make free phone calls.

In the computing community, the primary meaning of hacker is a particularly brilliant programmer or technical expert. (For example, “Linus Torvalds, the creator of Linux, is considered by some to be a hacker.”)

2) Computer Security Hackers – They are people who work with security side of the computers. It might be securing up the computers/networks or breaking into them.

So computer security hackers can be distinguished by the way in which they use their extra-ordinary computing skills.



White Hats : White Hat hackers are the good guys who use their hacking skills to protect computers/networks. A lot of demand for these hackers, companies pay them high salaries for securing their systems and networks from getting hacked.

Black Hats : Black Hat hackers are the bad guys in the game. They want to intrude security and make money. They take down networks and install backdoors. They use hacking for criminal purposes.

Grey Hats : Grey Hat hackers work for offensive and defensive purpose depending on the situations. They are hired by people to intrude and protect systems. They can be hired for any type of hacking.

Hactivists : Hactivists aka cyberpatriots hack to bring out a social change. They hack government and organizations to announce social, ideological, religious, or political message’s. Hackers fighting between countries are hacktivists. Like hackers of india and pakistan have been fighting for a long time, one side hacks the other sides website’s.

Script Kiddies : A Script Kiddie is a person who boasts breaking systems using scripts and codes which are written by other hackers. They hardly know what the code does. They engage into easier techniques of hacking as phishing and using exploits.

Conclusion :

So hackers can be good or bad people using their extra-ordinary computing skills for good, evil, business or just plain simple fun.

Be Aware Before Get Into it..

Site Only For Hackers

All Hackers Are Invited To Join Here

No One Can Stop Us


Mail To : indianhackingstuffs@gmail.com