DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Hacktivists attack UK police sites to protest arrest of Julian Assange

Posted on April 18, 2019 by Dissent

Hacktivism is seeing a resurgence recently, in no small part fueled by the arrest of Julian Assange. #Op hashtags for the UK, Sweden, and Ecuador signal the intent of the attackers.

#Anonymous #FreeAssange #OpEcuador #OpAssange #OpSweden #OpUK #OpUS @your_anon_net @LorianSynaro and @Pryzraky took #Offline UK Police website. Sweden its also our target! You will be attacked soon!

Site: https://t.co/jjuoeoSocK pic.twitter.com/qmGeQmdS3P

— Anonymous (@your_anon_net) April 18, 2019

The police.uk site was back up at the time of this posting, but that was just one site hit. Rogue Media Labs reported that @Cyberghost404 of the Philippine Cyber Eagles (@PhCyberEagles) released a data dump with data from more than two dozen UK police-related agencies. The data dump, obtained by DataBreaches.net, does not appear to leak particularly sensitive personal information, and it is not clear what site the data were obtained from. The files, including spread sheets on stop-and-searches, organized by police unit/location, and outcomes, seem to be February data that was accessed or dumped at the beginning of April.

I suppose the question for now is:  what other files might these hacktivists have acquired that they have yet to dump?

Category: Breach IncidentsGovernment SectorHackNon-U.S.

Post navigation

← ME: Acadia Hospital mistakenly released confidential information of 300 Suboxone patients
ME: City of Augusta hit by computer virus, City Center closed →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Mysterious leaker GangExposed outs Conti kingpins in massive ransomware data dump
  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • Class action settlement following ransomware attack will cost Fred Hutchinson Cancer Center about $52 million
  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Resource: HoganLovells Asia-Pacific Data, Privacy and Cybersecurity Guide 2025
  • She Got an Abortion. So A Texas Cop Used 83,000 Cameras to Track Her Down.
  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.