DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Attack on russia leaves 60+ sites hacked, thousands of accounts leaked

Posted on November 3, 2012 by Lee J

russia@TeamGhostshell have been at it again doing operations out of the public eye that has now amounted in yet another massive load of data from mainly Russian based domains. The leak has been posted in similar fashion to the past large breaches by @TeamGhostshell so there is plenty of mirrors. the leak has a main index file with links to a few hundred different pastes which total information from 60+ websites. The attack is being dubbed as ProjectBlackStar which is also very similar to past projects (ProjectDragonFly, ProjectWestWind) by GhostShell. The information from the leak appears to be complete databases from sites such as medical.ru, rpolice.ru, lada.ru and many other high profile and important websites or services such as telecomunications, airports, transport etc. So far we have discovered the following sites as breached. projectblackstar-targets @TeamGhostshell has declared this a war on russia and in the leak file comes the below message.

For far too long Russia has been a state of tyranny and regret. The average citizen is forced to live an isolated life from the rest of the world imposed by it’s politicians and leaders. A way of thinking outdated for well over 100 years now. The still present communism feeling has fused with todays capitalism and bred together a level of corruption and lack of decency of which we’ve never seen before. People getting silenced from standing up to their own morals and values; such as journalists/reporters conveniently gone missing after criticizing those in power; so called ‘spontaneous protests’ having no real impact besides the purpose of showing the rest of the world that Russia is a democratic place; and public meetings to poorer neighborhoods with empty promises, where after, they get in their expensive cars and drive to their luxurious yachts for a well deserved rest. Large corporations end up making the political game and with it, the future of the country. And yet, injustice is all over the world, but something did stand out from all of it. Even though the country is going through hard times and many people are starving, the Russian Government has enough resources to spend on it’s spies. https://www.businessinsider.com/alexander-fishenko-indicted-feds-bust-houston-spy-network-accused-of-shipping-50-million-in-high-tech-electronics-to-russia-2012-10 There have been many arrests this year (just like in any other year). If they think that espionage is fun while the people are barely holding on for their lives, then we’re going to play a little game as well. GhostShell is declaring war on Russia’s cyberspace, in "Project BlackStar". The project is aimed at the Russian Government. We’ll start off with a nice greeting of 2.5 million accounts/records leaked, from governmental, educational, academical, political, law enforcement, telecom, research institutes, medical facilities, large corporations (both national and international branches) in such fields as energy, petroleum, banks, dealerships and many more. GhostShell currently has access to more russian files than the FSB and we are very much eager to prove it. – DeadMellox

We have obtained copies of all data for archiving and research and plan to go over it this weekend with results being publish asap.

Related posts:

  • GhostShell, On the Record – Why did he really disappear in 2013?
  • Attacks By Team Ghost Shell
  • @TeamGhostShell Returns with Leak the entire summer
Category: Breach Incidents

Post navigation

← A Sandy-induced hiatus
National Health Institute attacked again, 4000+ user credentails leaked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Texas Centers for Infectious Disease Associates Notifies Individuals of Data Breach in 2024
  • Battlefords Union Hospitals notifies patients of employee snooping in their records
  • Alert: Scattered Spider has added North American airline and transportation organizations to their target list
  • Northern Light Health patients affected by security incident at Compumedics; 10 healthcare entities affected
  • Privacy commissioner reviewing reported Ontario Health atHome data breach
  • CMS warns Medicare providers of fraud scheme
  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Hacker helped kill FBI sources, witnesses in El Chapo case, according to watchdog report
  • Germany Wants Apple, Google to Remove DeepSeek From Their App Stores
  • Supreme Court upholds Texas law requiring age verification on porn sites
  • Justices nix Medicaid ‘right’ to choose doctor, defunding Planned Parenthood in South Carolina
  • European Commission publishes its plan to enable more effective law enforcement access to data
  • Sacred Secrets: The Biblical Case for Privacy and Data Protection
  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.