DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Break Down of Information from City of Lansing by Turkish Ajan

Posted on May 30, 2013 by Lee J

city-of-lansing-michiganrelated article In the leaked files contains a wide range of personal information from people who have registered with the site. The personal information found in the leak has been broken down into sections below as to where it was found and what exactly was found. Folder: bike File: poc.xmls Found: 1782  usernames, passwords, email addresses and genders. Passwords are not encrypted and some examples are "letmein, fakepass, password" Folder: emscert File: emscert_points.xmls Found: 2 Administrator names, clear text passwords and other information. Folder: emscooling File: emscooling_points.xmls Found: 2 Administrator names, clear text passwords and other information Folder: epa File: users.xmls Found: 27 Administrator accounts with system name, admin name, email addresses, mix of encrypted and clear text passwords. Emails not only belong to the main City of Lansing domain but also a domain of which appears to be in control of its main site, spartaninternet.com and a single education one msu.edu. Folder: hrcs_diversityconf File: poc.xmls Found: 67 Credentials from education, business and alike with full names, locations, addresses, contact numbers, numeric based passwords and email addresses. Folder: ledc File: spartan_users.xmls Found: 17 Administrator accounts with usernames, email addresses and encrypted passwords. Folder: ledc File:  spartan_userinfo Found: 8 credentials that belong to the administrators from the spartan_users file. these contain names, addresses and contacts. Folder: listserv File: listserv_users.xmls Found: 18 Administrator accounts with user names, full names, email addresses, clear text passwords. Folder: listserv File: listserv_users.xmls Found: 7028 email addresses registered with the site. Folder: maintenance_activities File: poc.xmls Found: full names, user names. email addresses and clear text passwords. Folder: mysql File: user.xmls Found: 14 mysql server administrator details, user names and encrypted passwords. Folder: newsevents File: poc.xmls Found: 48 Administrator accounts with full names, user names, email addresses. clear text passwords. Folder: traffic_calming File: users.xmls Found: 2 administrator accounts with user names and clear text passwords. From going over all these files i have determined that a lot of the administrator accounts appear to be related to the sites emailing system as well as some from Michigan State University (msu.edu) and some from Spartan Internet Services (https://www.spartaninternet.com/) which appear to be the ones who have setup this system which is built on phpnuke, bbgroup and other well known open source platforms which are well known to be exploitable, outdated and as we have seen store information in clear text.


Related:

  • Large medical lab in South Africa suffers multiple data breaches
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • Is your cyberinsurance paid up? Are you sure?
  • Software dev accidentally leaks Australian govt documents
Category: Breach Incidents

Post navigation

← City of Lansing Hacked, Full Database Leaked by Turkish Ajan
Social site Qpid.me to help teens get STD tests and share results →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you’re part of a botnet

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.