The group of hackers at LulzSecurity.com had more fun today, it seems. I’m not reproducing their data here, but they posted unredacted emails and passwords of individuals who signed up for a porn site.. A few of them were from .gov or .mil domains and there were 18 from .edu domains:
Hi! We like porn (sometimes), so these are email/password combinations from pron.com which we plundered for the lulz
Check out these government and military emailaddresses that signed up to the porn site…
They are too busy fapping to defend their country:
[…]
Also, double LOL, 55 admin/webmasters of other porn sites:
[…]
Oh, and I guess enjoy these too; there’s around 26,000 passwords
These guys probably sign into Facebook with the same email/pass combo, so we suggest the following:
1) sign into their Facebook accounts
2) find their family members
3) tell them all about how the victim (you!) signed up to porn sites
4) watch the hilarity
5) tell us about it on twitter!
6) ???????
7) PROFIT[…]
Pron.com does not have any stated privacy policy linked from its home page, and LulzSec does not mention whether the passwords were stored in plaintext or if they were hashed. A few people who have tried using the exposed data to log into the users’ Facebook accounts have tweeted that so far, they’ve been unable to do so.