DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Ca: Rogers hacked by TeamHans, customer contracts and sensitive corporate e-mails dumped

Posted on March 1, 2015 by Dissent

Hackers calling themselves TeamHans have hacked the giant Canadian communications and media firm, Rogers, and dumped a lot of corporate proprietary data to prove it.

According to the hackers, who announced the hack on Twitter where they tweet as @TeamHans_, the dump includes:

  • Contracts with corporate customers
  • Sensitive corporate e-mails
  • Sensitive documents regarding Rogers (corporate employee IDs, documents, etc.)
  • The Rogers VPN, including an employee profile for it, which would provide access to their intranet

In an interview with DataBreaches.net, TeamHans members stated that they gained access on February 20 and continued to have access until today. They also described how they socially engineered a Rogers employee:

We went searching for a medium- level Rogers employee, and we ended up with Antonio Marino. We called Rogers IT Support desk and convinced the IT Specialist that we were employees at the company and we needed some assistance regarding another employee. She was more than happy to assist us, and asked us what we needed. We asked for an employee ID and his answers for his security questions. She gave them, we thanked her, and called back as Antonio Marino.

They asked what we needed, I said I forgot the password to my corporate Outlook account, he asked us two security questions (birthday and zipcode), which we answered correctly, and he then changed the password for us.

Upon signing into Marino’s Outlook, we forwarded all the emails to an email address, and we proceeded to download all the emails and include that with the release.

In poring through Marino’s e-mails, the hackers noticed something strange regarding a tool, they said:

So we did some digging and found out the tool was used for contracts (creating and viewing), so we went on the site http://rogerscontracttool.ca/ and signed in with the details our lovely friend at IT gave us. We then proceeded to download all of the contracts (which we also included in the dump). After that, we did some more skimming and realized something known as “IT Portal” from his emails. We went to that site, same details, and signed in. In there we managed to find the Rogers VPN with an employee profile, an employee copy of McAffe, and some other tools within it. So voila, we now have all of the contracts, all of the Rogers employee tools, as well as sensitive emails regarding the company.

TeamHans, which reportedly consists of three hackers, including @MarxistAttorney and ffx0, informed DataBreaches.net that their motivation was to get 70 bitcoins from Rogers in exchange for not revealing the hack or dumping the corporate information. When Rogers wouldn’t pay, they dumped the data. In response to a question from DataBreaches.net, they say that they have no fear of being arrested or charged. None of the members of the team are reportedly from Canada.

As of February 25, Rogers seemed to be aware that Marino’s e-mail had been hacked, as evidenced by this internal e-mail:

From: Iftequar Syed
Sent: Wednesday, February 25, 2015 9:42 AM
To: Marcus Elson
Cc: Michael Gibson
Subject: IN1076520 – Email has been hacked

Hi Marcus

Have this user at the IT Staging Window and apparently his email has been hacked and have received threatening emails concerning him and his family and he got a call to check his email.

Additionally when he called IT Support to open a ticket they created an IN107652 was opened and when IT Support’s email came to his mailbox he got another call from the hacker about this.

The ticket was assigned to the wrong queue assigned it currently to RCI-ISCF.

Needs immediate and Urgent attention, please contact the user Antonio Marino @ [Redacted by DataBreaches.net].

Thanks & Best Regards

In investigating the concerns about Marino, Rogers discovered the exfiltration of data, as a February 26th e-mail from Pavel Orlov, Incident Manager at Rogers, makes clear:

– There was nothing found going out to, or coming in from, the specified “ffx0” email address but there was other activity found when traces were run again *@openmailbox.org.
– A large number of Antonio’s corporate emails were forwarded to 2 suspicious looking email accounts on Feb 21st – [redacted by hackers] and [redacted by hackers] (146)

According to Orlov’s e-mail, in addition to Rogers’ investigation, the Halton Regional Police are investigating Marino’s reports of being hacked and threatened.

Of note, the hackers strongly deny claims made in at least two of the corporate e-mails that they ever threatened any violence against Antonio Marino or his family. Some of the internal e-mails allege that the hackers called Marino, knew a lot about his family, and threatened to kill them if they weren’t paid.  “We would never do something as stupid as that nor would we threaten it. We are hackers, not murderers,” TeamHans tells DataBreaches.net.
<
Asked if there was anything that they’d like to see included in this report, TeamHans replied, “Yes, Rogers need to fix their security and give their employees some form of training.”If what they described is accurate, I think we can all agree that the employees may need training or a refresher course on social engineering.

DataBreaches.net has e-mailed Rogers to request a response to the breach and will post an update if a response is received.

Update: see statement from Rogers here.

Category: Business SectorExposureHackNon-U.S.Of Note

Post navigation

← Ca: Star gets action from parking cops after privacy breach
Citizens Connect Accidentally Displayed Several Complainants’ Personal Information →

2 thoughts on “Ca: Rogers hacked by TeamHans, customer contracts and sensitive corporate e-mails dumped”

  1. Canuckster says:
    March 2, 2015 at 8:47 am

    I recall that a similar “social engineering” incident involving Rogers happened not that long ago. Tried searching for it on your pogowasright.org site and this site, but came up empty handed.

    A quick search on Google does indeed show similar happened a year ago. I

    1. Canadian Bitcoins Blames Rogers For Hack That Cost $100,000
    http://www.huffingtonpost.ca/2014/03/19/canadian-bitcoins-hacked-rogers_n_4995030.html

    and

    2. Ottawa bitcoin exchange defrauded of $100,000 in cyber currency
    http://www.ottawacitizen.com/business/Ottawa+bitcoin+exchange+defrauded+cyber+currency/9628321/story.html

    Two “social engineering” breaches in less than a year.

    What is that old saying?
    “Fool me once, shame on you; fool me twice, shame on me”

    This one is massive though.

    1. Dissent says:
      March 2, 2015 at 8:55 am

      I must have missed that one. So glad you remembered it!

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach
  • Hacker who breached communications app used by Trump aide stole data from across US government
  • Massachusetts hacker to plead guilty to PowerSchool data breach (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report