DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

OpUkraine kicked off by r00tsecurity

Posted on December 5, 2013 by Lee J

A group of hackers who call themselves r00ts3curity or #r00ts3c have started attacking Ukraine based websites and leaking data. The attacks appear to be apart of a new operation #OpUkraine and r00tsecurity is made up of a few already known hackers such as @Goons3c. So far they have managed to attack four sites and leak data from each. The sites attacked so far are the Kharkiv Regional Universal Scientific Library (www.library.kharkov.ua), a free nude pictures site (https://sex.dp.ua/), Dentistry Of Sevastopol (www.vityaz.in.ua) which is offline at time of publishing and the Centre for receiving and processing specific information and control (dzz.gov.ua) Breach statistics

  • dzz.gov.ua 1 admin account with user name and encrypted password.
  • www.vityaz.in.ua 2 admin accounts with user names and encrypted passwords
  • www.library.kharkov.ua 10 accounts leaked with user names and encrypted passwords
  • sex.dp.ua 1,504 user email addresses and user names. 1 admin account with user name and clear text password.

The first two leaks got uploaded to Goons3c pastebin account and the rest have been uploaded to r00ts3curitys pastebin account which i have been told will have many more to come over the coming weeks. You can also see a paste by r00tsec posted on the first which announces who they are and who the members are.

Category: Breach Incidents

Post navigation

← Froedtert's alleged lack of cooperation in breach investigation has Milwaukee considering litigation
NJ: 8 indicted for allegedly participating in identity theft ring at TD Bank →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes
  • Cocospy stalkerware apps go offline after data breach
  • Ex-NSA bad-guy hunter listened to Scattered Spider’s fake help-desk calls: ‘Those guys are good’
  • Former Sussex Police officer facing trial for rape charged with 18 further offences relating to computer misuse
  • Beach mansion, Benz and Bitcoin worth $4.5m seized from League of Legends hacker Shane Stephen Duffy
  • Fresno County fell victim to $1.6M phishing scam in 2020. One suspected has been arrested, another has been indicted.
  • Ransomware Attack on ADP Partner Exposes Broadcom Employee Data
  • Anne Arundel ransomware attack compromised confidential health data, county says
  • Australian national known as “DR32” sentenced in U.S. federal court
  • Alabama Man Sentenced to 14 Months in Connection with Securities and Exchange Commission X Hack that Spiked Bitcoin Prices

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy
  • Massachusetts Senate Committee Approves Robust Comprehensive Privacy Law
  • Montana Becomes First State to Close the Law Enforcement Data Broker Loophole
  • Privacy enforcement under Andrew Ferguson’s FTC
  • “We would be less confidential than Google” – Proton threatens to quit Switzerland over new surveillance law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.