DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

(USCIS) US imagination Services Hacked, Database Leaked by @SwaggSec

Posted on June 15, 2012 by Lee J

@SwaggSec has been around for some time now and they have recently become more active again with hacks and leaks being announced weekly. The latest one appears to be on the US imagination Services  website uscis.gov. The attack seems to have a few parts to it and is also a bit confusing with another hacker coming out claming this is a false hack, but regardless to all that there has been some important/personal information leaked. The leak contains the database for the cart and paypal payments system as well as other stuff like pages, menus and other typical data you will find in a content management system database. The leak has been posted onto pastebin and there appears that there was a defacing done to a related website 2 day ago aswell that featured the above picture before redirecting to twitter. The leaked data was uploaded with a small preview to pastebin and the rest is hosted on the swagsec website.

Hacking Today for an Entertaining Tomorrow. What we got here, is some straight government material. Now, we’re not hatin’ on tha’ US immigrants but the US treatin’ the immigrants. It’s corruption, not as bad anymor’ but it’s still there. They do some of ’em racial profiling that gets us swagg kids in jail ’cause the color of our skin. We tryin’ our best not to let that happen anymore. And when it does, we are there do some much needed destruction. But real reason behind all of this anyways, is to make you all smilin’ everytime you see one a’ our releases. It’s part of our philosophy. For now, this hack is for launchin’ our new site "https://swaggsecurity.com". This hack was a simple hack that was completed three days ago. Even though the root admin, "robert" noticed we hacked his hosting company, he continued to ignore our attempts. And as a result we will be releasing what we hacked and the USCIS.gov SQL server in a text format. For this hack due to being less then 600KB, we have decided instead of a torrent we will be releasing it on our new site, which we proudly present. Here is a sample of usernames of the SQL database, while there is also customer information and green card information.

https://pastebin.com/S6VVpZC8 https://swaggsecurity.com/uscis.txt The claims that this is false data comes from another hacking crew named Digital Corruption @digitalcorrupt and they have posted the below message in a small leak that was also uploaded to paste bin and it also contains a small preview of the data.

Now, we leaked these for two reasons; one of these reasons are that we hate racisim. Another reason is because of a few skids, known as SwaggSecurity; Hey, SwaggSec? I heard you claim to hack systems with old internet explorer vulnerabilities, or was it that you actually buy accounts from people turned whitehat? You have been warned, step down; or get shut down. You have chosen the second one, and like Lulz-Security; you will fall from us.

https://pastebin.com/ys1EKC3x


Related:

  • IVF provider Genea notifies patients about the cyberattack earlier this year.
  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
Category: Breach Incidents

Post navigation

← 150,000 Accounts Leaked From CustomCoD By @GoogleSWE
.c0mrade Claims Exploits on Major Airline Systems →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.