DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

50,000 Accounts Leaked From ITWallStreet.com by @MidasBank

Posted on July 18, 2012 by Lee J

A member of Team Ghost Shell (@TeamGhostShell) has contacted us with a huge leak of accounts and other personal information that comes from a well known and widely used wall street based website. The site Itwallstreet.com was attacked by a member using the twitter handle @MidasBank aka Masakaki. In the leak comes a short message which explains this new team ghost shell based account will be taking sights on financial based targets only.

ITWallStreet.com is an online job source created in 2006 by Andiamo Partners, a prominent technical recruiting firm in the financial services industry. We invite IT professionals to come to ITWallStreet as passive or active candidates, and can perform searches, upload your resume, and apply for jobs with the utmost confidence that your search will remain confidential.

The leak was also announced via twitter from @MidasBank account. > MidasBank ‏@MidasBank Hellooooo, Wall Street owned: https://privatepaste.com/6d2938aeda  ||https://pastesite.com/39950  ‪#OWS‬ ‪#MidasBank‬

At the end of the leak release file there is also another note which makes claim they have further information which they plan to sell on the blackmarket.

Over 3000 resumes were held in by MidasBank to trade them on the black market. <3

The leak release file comes in 12 parts which are posted to privatepaste and pastesite as mirrors. the leak appears to be in the format of a complete large SQL database dump and contains userdetails such as names, address, phone numbers, date of births, emails passwords and other information. All passwords appear to be encrypted and total account leak is unclear but is claimed to around 50k. Leak Release:

Hello there! My name is Masakaki, part of the Far-Eastern Financial District of #TeamGhostShell. I’m here today to bring you all something fascinating, but before that, I should probably explain what’s "MidasBank" and what does it stand for. GhostShell has been leaking left and right all kinds of targets, well we’re here to bring some sort of order to it, which is why this district will function solely to provide leaks from an economical point of view, institutional and educational, but primary, it will focus on the financial aspect of things. With that being said, what better target to pick as a first release, than the place that puts all markets to shame in the world. Wall Street. IT Wall Street owned. Around 50.000 accounts compromised. The list contains both current, past, and rejected IT personal from Wall Street. The information is as detailed as ever with many other surprises in it. Please, enjoy. Part1: https://pastesite.com/39938 Mirror: https://privatepaste.com/8902091de0 Part2: https://pastesite.com/39939 Mirror: https://privatepaste.com/fdd34a962c Part3: https://pastesite.com/39940 Mirror: https://privatepaste.com/3d09d76efa Part4: https://pastesite.com/39941 Mirror: https://privatepaste.com/076898e24b Part5: https://pastesite.com/39942 Mirror: https://privatepaste.com/091f40f437 Part6: https://pastesite.com/39943 Mirror: https://privatepaste.com/af57ff9a72 Part7: https://pastesite.com/39944 Mirror: https://privatepaste.com/a7b7f50f8b Part8: https://pastesite.com/39945 Mirror: https://privatepaste.com/7497019141 Part9: https://pastesite.com/39946 Mirror: https://privatepaste.com/99d7d1add6 Part10: https://pastesite.com/39947 Mirror: https://privatepaste.com/f285051157 Part11: https://pastesite.com/39948 Mirror: https://privatepaste.com/3dc10560cb Part12: https://privatepaste.com/55d65f1f94 Mirror: https://pastesite.com/39949

https://privatepaste.com/6d2938aeda

Category: Breach Incidents

Post navigation

← Skype Source Code Leaked
20,000 Clear Text Account Details Leaked From The Himalayan Times By @SirLeakAlot →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024 (2)
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.