DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Break Down of Information from City of Lansing by Turkish Ajan

Posted on May 30, 2013 by Lee J

city-of-lansing-michiganrelated article In the leaked files contains a wide range of personal information from people who have registered with the site. The personal information found in the leak has been broken down into sections below as to where it was found and what exactly was found. Folder: bike File: poc.xmls Found: 1782  usernames, passwords, email addresses and genders. Passwords are not encrypted and some examples are "letmein, fakepass, password" Folder: emscert File: emscert_points.xmls Found: 2 Administrator names, clear text passwords and other information. Folder: emscooling File: emscooling_points.xmls Found: 2 Administrator names, clear text passwords and other information Folder: epa File: users.xmls Found: 27 Administrator accounts with system name, admin name, email addresses, mix of encrypted and clear text passwords. Emails not only belong to the main City of Lansing domain but also a domain of which appears to be in control of its main site, spartaninternet.com and a single education one msu.edu. Folder: hrcs_diversityconf File: poc.xmls Found: 67 Credentials from education, business and alike with full names, locations, addresses, contact numbers, numeric based passwords and email addresses. Folder: ledc File: spartan_users.xmls Found: 17 Administrator accounts with usernames, email addresses and encrypted passwords. Folder: ledc File:  spartan_userinfo Found: 8 credentials that belong to the administrators from the spartan_users file. these contain names, addresses and contacts. Folder: listserv File: listserv_users.xmls Found: 18 Administrator accounts with user names, full names, email addresses, clear text passwords. Folder: listserv File: listserv_users.xmls Found: 7028 email addresses registered with the site. Folder: maintenance_activities File: poc.xmls Found: full names, user names. email addresses and clear text passwords. Folder: mysql File: user.xmls Found: 14 mysql server administrator details, user names and encrypted passwords. Folder: newsevents File: poc.xmls Found: 48 Administrator accounts with full names, user names, email addresses. clear text passwords. Folder: traffic_calming File: users.xmls Found: 2 administrator accounts with user names and clear text passwords. From going over all these files i have determined that a lot of the administrator accounts appear to be related to the sites emailing system as well as some from Michigan State University (msu.edu) and some from Spartan Internet Services (https://www.spartaninternet.com/) which appear to be the ones who have setup this system which is built on phpnuke, bbgroup and other well known open source platforms which are well known to be exploitable, outdated and as we have seen store information in clear text.

No related posts.

Category: Breach Incidents

Post navigation

← City of Lansing Hacked, Full Database Leaked by Turkish Ajan
Social site Qpid.me to help teens get STD tests and share results →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.