GhostShell Leaks Data From 32 Sites In ‘Light Hacktivism’ Campaign

After a few months of silence, the Romanian hacktivist is back to expose the dangers of leaving FTP ports unprotected.

Dark Reading Staff, Dark Reading

May 17, 2016

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Romanian hacker GhostShell has kicked off a new campaign dubbed Light Hacktivism with the purpose of highlighting the weak security practiced by today’s online businesses, reports Softpedia.

The hacker, who recently revealed his real identity, has come up with a data dump from 32 websites, including government, educational, medical, industrial and personal, and put them on three paste sites.

GhostShell, or Razvan Eugen Gheorghe, told Softpedia he was able to get hold of important information from these sites because of negligent admins and open FTP ports. Many companies, he says, were leaving sensitive details, like usernames, passwords, personal identities, etc, on open ports which made them accessible to hackers. He claims that in some cases he was able to manipulate the vulnerability of the open ports to access the entire server.

GhostShell has warned of more leaks in the coming days.

"Never underestimate the most simple vulnerabilities out there as they often end up being anyone's downfall. Light Hacktivism is about finding and exposing those vulnerabilities to the public so that they can be patched," GhostShell told Softpedia.

For full story, go here.

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights