Hacktivists Crack United Nations, Publish User DataHacktivists Crack United Nations, Publish User Data
TeamPoison might have broken into UN Development Program website
December 1, 2011
A hacktivist group called TeamPoison (TeaMP0isoN) has leaked more than 100 usernames, email addresses, and passwords belonging to the United Nations, claiming that the UN is guilty of corruption.
The user data appears to belong to individuals at the United Nations Development Programme (UNDP), Organisation for Economic Co-operation and Development (OECD), UNICEF, World Health Organisation (WHO), and other groups, according to news reports.
The gang noted, when publishing its stash on PasteBin, that some of the user IDs appeared to have a blank password.
Reports indicate that the hackers were able to take advantage of a vulnerability on the United Nations Development Program website to extract the IDs, email address, and passwords of users. The UN told reporters that the information obtained was from an old server and contains no current or valuable information. The accounts obtained are no longer active, the UN says.
The UN is not saying exactly how the attack occurred. "The question now is how?," the hacktivist group said. "We will let the so called 'security experts' over at the UN figure that out. Have a nice day."
TeamPoison recently announced that it is joining forces with Anonymous on a new initiative dubbed "Operation Robin Hood," targeting banks and financial institutions.
Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper