DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Police Suppliers And Websites Hit In #FTPFriday By @k0detec

Posted on May 25, 2012 by Lee J

content/images/gallery/antisec12/policeleaks.png A self claimed fraction of the anonymous #antisec movement, @k0detec has just announced a new fuck the police friday data dump which contains several websites administration and user credentials. So once again this one is sure to annoy and anger a lot of different people and with all the other recent high profile attacks its starting to prove its point that the Internet is really not secure at all, especially the ones we are meant to trust in have no security. The leak contains 5 different websites all with usernames and passwords and stupidly enough one of them passwords is 12345 and yes they where stored in clear text, which one proves lack of security. Press Release Message:

Hello, we are k0detec, a fraction of the #anonymous faction known as #antisec. Below you can find some law enforcement related tidbits of info, but if you are willing to stick with us up here for a few minutes we would like to speak on a few things. The reasons for the growth of #anonymous and the flowering of #antisec were no less valid or real on August 16th 2011, the day after Sabu plead guilty in a secret court hearing to various crimes. If anything that event and the events that followed it should be a rallying cry, a clarion call to those who weren’t sure what side they were on. The government will chew you up and spit you out, threaten you, turn you against your friends and comrades, lie to you and then shit all over you if they want to. After seeing what happened to LulzSec we shouldn’t flinch, we should take a moment to mourn, learn from their errors and redouble our efforts. Hell, if some twitter accounts were to be believed LulzSec is still with us and there were more "ex-leaders" of LulzSec than actual members, strange that. We digress.. The people in charge, the "control machine" of the Government, the police the corrections system and the intelligence agencies think that the internet is a one way street, information flows from us to them, they are so very wrong. This is a two way street, the only thing between us and you are some wires, ones and zeros. Nobody is untouchable. #antisec is a line in the sand, you cross it and we will respond. You want to steal our privacy, kiss yours good bye. We at k0detec are a little discerning in our choice of targets, primarily law enforcement, government agencies and those who profit from business with cops, militarists and corrupt governments. No Albanian florist shops and no Yoga centers. Fuck unimind unity, but let’s at least have enlightened internal non-aggression. Stop the infighting, the d0xing and the squabbling. Start reading, writing, talking, marching, hacking! Refuse to be silent or complicit in their system. Remember who the real enemies are.

The attacked websites are https://www.tmprotection.com ————————— "For over three decades, T&M Protection Resources has been providing a growing portfolio of seamlessly integrated security and investigative services, including state-of-the-art security technologies, to leading corporations, organizations and private clients. In a world of rapidly changing and ever-present threats to the safety and security of people, property and reputations, T&M is your partner in creating customized security solutions that meet your goals for protection at the workplace, in the home and on the road." Orly? We will let them tell you more details: Threat Analyses and Vulnerability Assessments Security Master Plan Development –>>Executive Protection Planning and IRS Reviews for CEOs –>>Police & Public Safety Consulting Services Business Impact Analysis Operational Readiness Assessments Emergency Preparedness Services Security Systems Evaluations Integrated Security Systems Design and Implementation Travel Security Briefs Security Policies & Procedures Development Security Training We were almost sold on their services, hell, we are pissing enough people off we might NEED some kind of a protection service.. This leak contains usernames and encrypted passwords. https://www.marionso.com/ ———————— Marion County Sheriff’s Office better run their server status alert script to notify them that we’ve been and gone, in fact let us help you in case the contact person slipped your minds. This leak contains usernames and clear text passwords, https://www.eapolice.com / www.owegopolice.org: ——————————————— Damn, this site gave us access to a lot of info, we got your SAGE login details by the way, for what looks like every business in your whole town, but we are only going to release: Sadly the above leak was the one that contains a 12345 password. this leak contains username. ids and clear text passwords. https://www.sierracounty.ws ————————– Sierra County, California, wish we’d had more time to run these passwords so we could read your probation officer’s e-mail, but time waits for no one. This leak contains user ids, emails and encrypted passwords. https://pastehtml.com/view/bz9917s75.rtxt


Related:

  • Two more entities have folded after ransomware attacks
  • Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks
  • Premier Health Partners issues a press release about a breach two years ago. Why was this needed now?
  • Missouri Adopts New Data Breach Notice Law
  • Qantas obtains injunction to prevent hacked data’s release
  • Global operation targets NoName057(16) pro-Russian cybercrime network in Operation Eastwood
Category: Breach Incidents

Post navigation

← Anonymous Operation NewSon Gets Ready To Attack Major Targets
UGNAZI Website Leakster.net Under F.B.I. Investigation For Comcast & WHMCS Attacks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
  • BreachForums — the one that went offline in April — reappears with a new founder/owner
  • Fans React After NASCAR Confirms Ransomware Breach
  • Allianz Life says ‘majority’ of customers’ personal data stolen in cyberattack (1)
  • Infinite Services notifying employees and patients of limited ransomware attack
  • The safe place for women to talk wasn’t so safe: hackers leak 13,000 user photos and IDs from the Tea app

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.