DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GabLeaks: Claims by Gab Refuted by DDOSecrets.com

Posted on March 1, 2021 by Dissent

Not surprisingly, extremists appear to have made some false claims about a hack and data dump involving the far-right platform known as Gab. Rather than repeat their claims — claims that include blatantly bigoted language — DataBreaches.net provides the statement by public interest group DDOSecrets.com:

Distributed Denial of Secrets provided a pre-release copy of the data to a reporter with Wired. As is standard practice, the reporter reached out to Gab for comment. In response, Gab posted a blog entry stating that “reporters, who write for a publication that has written many hit pieces on Gab in the past, are in direct contact with the hacker and are essentially assisting the hacker in his efforts to smear our business and hurt you, our users.”

These accusations are entirely false. Wired’s only interest was in reporting on the SQL injection and resulting breach of Gab, as well as Distributed Denial of Secret’s decision to provide journalists and researchers with copies of the data. To our knowledge, no one at Wired has had contact with the source – JaXpArO (they/them) & My Little Anonymous Revival Project – who entrusted us with both the data and their safety.

The following day, Gab CEO Andrew Torba made a post which indirectly referred to Distributed Denial of Secrets and called members of the group “mentally ill [t-slur] demon hackers,” accusing us of “attacking Gab right now” before claiming that both his and Trump’s Gab accounts were compromised, without specifying how or in what way.

The post also accused Distributed Denial of Secrets of targeting “law enforcement and their family members last summer.” Like other claims made by Torba, this is false. BlueLeaks did not “target” law enforcement, it simply exposed documents revealing the activities of law enforcement, including wrongdoing, which led to numerous news reports. Family of law enforcement were unaffected. Documents obtained through the Freedom of Information Act confirm that the names, phone numbers and addresses exposed were official work ones similar to what can be found on many law enforcement agency’s websites and public directories.

Distributed Denial of Secrets had no role in the compromise of Gab or any other service, and did not crack any password hashes, use any of the plaintext group passwords, or otherwise compromise anyone’s account. Early in the review process, we made the decision to limit the distribution of the dataset to both protect the privacy of innocent Gab users and the integrity of their accounts and private groups.

Read more on Distributed Denial of Secrets.  You can read more about DDOSecrets.com here.


Related:

  • UN Cybercrime Convention to be signed in Hanoi to tackle global offences
  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • Toys “R” Us Canada customers notified of breach of personal information
  • Kaufman County's data breach was their second one in three weeks
  • Hacking Formula 1: Accessing Max Verstappen's passport and PII through FIA bugs
Category: Breach IncidentsHackMiscellaneous

Post navigation

← Some San Diegans’ personal information provided to Jewish Family Service exposed online
AZ: City of Kingman government computer system hit by cyberattack →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.