DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Russian Intel and Spy Company SearchInform Hacked, Client Apps & Access Leaked By @Rucyborg

Posted on March 12, 2014 by Lee J

9ds Today Russian hacktivist @Rucyborg has announced a leak of data from Searchinform and sent a message out to its director. The leak was announced a couple of hours ago via twitter and posted to cyberguerrilla.org with a message which states that the hackers have had access to searchinform.ru since as far back as 2012 and that they have infected  download links. The leak was uploaded to bayfiles and is part 2 of an on going assault on Russia in relation to the recent drama that putin has been creating. Searchinform is one of them sneaky company’s with an even more sneaky product which allows snooping on others, while in this day and age is not so surprising but the extent which they do go to is pretty extensive and really does pose a huge security risk to one if the wrong person was to be using it. They offer work time monitors, full-on network sniffers designed at modern day communications over social medias, microphone sniffers for recording employees and a whole range of other products. Data leaked is in a 382MB compressed file that contains well over 3000 files which include instructions and usage information, also it appears to have copies of searchinform for clients and basic new client setup information. In normal fashion there has been a imgur gallery created with a preview of the contents of this leak which can be found below, i have also added a couple of screen shots of the contents of the uncompressed leak data. The message on  cyberguerrilla.org also has a direct message for the CEO of SearchInform.

Our message to SearchInform.ru – director Ozhegov – you are a bunch of FSB bastadz – leaking information to all the counterparts and outsiders – you provide so called CONTUR of Security to main russian corps – and keep control of all the clients for the SORM needs – nonight – the stars – revolt- and this is your downfall.

Once i have a bit more free time on my hands i will have a bit of a deeper dig into this data, until then here is the images of the contents of the data files. Contents:   Org post:

ussian Cyber Command Transmission 002VELESNPTI01 Dobry Vecher Comrads! This very day we as promissed present ‘proof of concept’ sort of, related to TOP Russian Spy Company – SEARCHINFORM.RU – or else called NOVYE POISKOVYE TECHNOLOGII – tonight we deliver a devastating blow into Putin regime by anihilating his TOP IT market leader – the FSB company that is in control of main russian infrastructure companies – like VELES CAPITAL, RUSAL, GAZPROM, SUKHOI and many many others. Including Russian United Airobuild Corp – OAK and IRKUT. We were in control of SEARCHINFORM.RU since early 2012. We have infected all the download links for their customers, mentioned above and those you can find in the archive enclosed. We have gained control of all of them through the compromised support system and control panel of the provider (NPT). Next time we shall deliver VELES CAPITAL and it’s Director – Gnedovsky A.D. who’s going to be the main Investor in Russian Crimea. Our message to SearchInform.ru – director Ozhegov – you are a bunch of FSB bastadz – leaking information to all the counterparts and outsiders – you provide so called CONTUR of Security to main russian corps – and keep control of all the clients for the SORM needs – nonight – the stars – revolt- and this is your downfall. Preview: https://imgur.com/a/RKM5h Main arch: https://bayfiles.net/file/18L8Z/dICvHg/sinformru.rar inside logins passwords ftp and other funky stuff Peace! HI 5 to YourAnonNews, TPB, VoxAnon, LulzSEC and all others who know what we are into and how we make it happen in a first place – We are Strong and We be back

Category: Breach Incidents

Post navigation

← NoMoreRack.com Probes Possible Card Breach
Almost 10,000 being notified of January computer theft at UC San Francisco Family Medicine Center →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Cyberattack pushes German napkin company into insolvency
  • WMATA Train Operators Arrested in Health Care Fraud Scheme
  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.