DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Australian Security Firm SIG Hacked, Data Leaked by Anonymous

Posted on July 31, 2013 by Lee J

mini_logo Today an Anonymous hacker who uses the handle @G3NTbl4ck has announced a leak of data from an Australia based Security Firm named SIG. SIG which is short for Security Intelligence Group has its head office based in Western Australia and provides services like risk management to corporations around the world. The hacker announced the breach a short time ago from their twitter account and posted the leaked data to pastebin. twitter-g3ntbl4ck The leak which comes with a short message and statement that claims this as an Anonymous hack which has been done in part to "Smash the corporate surveillance state".

H4CK3d by Anonymous oHai… Security Intelligence Group… #LULZ on you not so secure are we? Anonymous is here for the Revolution and to smash the corporate surveillance state …but also for t3h Lulz…so from #FuckYouSec to you… with much disgust and dissent FUCK YOU and Fuck The Pigs you work for…thats you –> https://www.police.wa.gov.au/ …also there is hopefully some more on the way….too late to fight it na0 faggots …also cocks

Leaked data from the breach contains 2 administrator accounts with user names, real names, email addresses and encrypted passwords. There is also other data from what appears to either be clients or partners with mostly contact details such as addresses, phone numbers and names being leaked. Last week G3NTbl4ck  released data from another Surveillance company named Vislink and the release message from this one suggests that there is more to come and possibly from further Australian based sites.

Category: Breach Incidents

Post navigation

← Ca: City of Abbotsford online services hacked, residents’ data at risk
Final Report on FSSA Security Breach →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.