communique from pastebin:
Greetings fellow global pirates,
The halls are decked with lulz, AnonSanta’s battle sleigh is re-filled, and lulz lizards worldwide are awaiting his arrival. Wait no longer, good denizens of the Internet, it’s time for another round of the LulzXmas festivities.
But first, tell us, have you enjoyed the complete obliteration of Stratfor live on IRC and Twitter? We have. We also laughed heartily whilst these so-called protectors of private property scrambled desperately to recover the sensitive information of all the customers who they wronged by failing to use proper security precautions. Stratfor’s Terms of Service stated, “Security: The personally identifiable information we collect about you is stored in limited access servers. We will maintain safeguards to protect the security of these servers and your personally identifiable information.” Yet Stratfor lazily stored credit card information and corresponding data unencrypted. Is the irony palpable yet?
Continuing the week long celebration of wreaking utter havoc on global financial systems, militaries, and governments, we are announcing our next target: the online piggie supply store SpecialForces.com. Their customer base is comprised primarily of military and law enforcement affiliated individuals, who have for too long enjoyed purchasing tactical combat equipment from their slick and “professional” looking website. What’s that, officer? You get a kick out of pepper-spraying peaceful protesters in public parks? You like to recreationally taser kids? You have a fetish for putting people in plastic zip ties?
We had to contain our laughter when we saw these two “hacker proof” logos plastered on the SpecialForces.com website: “Scanned by GoDaddy.com: secured website” and “McAfee SECURE sites help keep you safe from identity theft, credit card fraud, spyware, spam, viruses, and online scams.” Despite the almighty powers of GoDaddy and McAfee’s logos and some reassuring words, SpecialForces.com was just no match for our hella wicked black hat voodoo. We have just one question before we continue: You mad, officer?
To be fair, at least SpecialForces.com DID store their customers’ credit card information using blowfish encryption (unlike the global intelligence and security industry “professionals” at Stratfor, who apparently remain confused as to whether their customers’ information was even encrypted or not). Nevertheless, our voodoo prevailed and we were quickly able to break back into the military supplier’s server and steal their encryption keys. We then wrote a few simple functions to recover the cleartext passwords, credit card numbers, and expiration dates to all their customers’ cards. That’s how we roll.
In reality, for the past few months, we have been in possession of approximately 14,000 passwords and 8000 credit cards from SpecialForces.com. Unfortunately a former comrade leaked the password list early, and the full story on this owning will be told in our upcoming zine. Until then, feast upon one hell of a juicy text file.
We’ll continue to have ourselves a merry LulzXmas at the expense of capitalist pigs, corrupt public officials and all those third parties who cater to the continued oligarchic elite worldwide. We are your secretaries, your janitors, your babysitters, your IT guys, your bus drivers, your maids, your hard-working, driven and determined fellow humans. We could be sitting next to you in a coffee shop, scanning your goods at a department store or even fixing your busted-ass computer. We are here to stay, and by now, you had better damn well expect us, cause the time for simple “lulz” is long past.
Oh, and by the way: Did Bradley Manning get his fancy holiday meal yet? Might want to hurry up before we hit even more targets.
http://ibhg35kgdvnb7jvw.onion//lulzxmas/specialforces_full.txt.gz <- orders/addresses/ccs
http://ibhg35kgdvnb7jvw.onion//lulzxmas/specialforces_passwords.txt <- just the passwords
http://wikisend.com/download/287544/specialforces.tar.gz <- both combined
# grep -R -H -i ‘.mil’ specialforces_passwords.txt | wc
1274 8072 127545
# grep -R -H -i ‘.gov’ specialforces_passwords.txt | wc
159 1064 15720
# ls -al /home/
drwxr-xr-x 15 root root 4096 Nov 19 2009 .
drwxr-xr-x 24 root root 4096 Mar 30 04:15 ..
drwxr-xr-x 10 ambientgraphic ambientgraphic 4096 Aug 11 10:37 ambientgraphic
drwxr-xr-x 4 ambientscan ambientscan 4096 Feb 27 2009 ambientscan
drwxrwxrwx 30 client client 8192 Aug 12 03:46 client
drwxr-xr-x 11 cliffdigital cliffdigital 4096 Aug 11 14:11 cliffdigital
drwxr-xr-x 8 mywallbuddy mywallbuddy 4096 Jul 28 14:49 mywallbuddy
drwx—— 2 nathan nathan 4096 Sep 12 2008 nathan
drwxrwxrwx 3 nobody nobody 4096 Oct 3 2008 nobody
drwxr-xr-x 7 nosurrender nosurrender 4096 Feb 23 2010 nosurrender
drwxr-xr-x 4 ridgewoodapts ridgewoodapts 4096 Apr 9 2008 ridgewoodapts
drwxr-xr-x 4 scan scan 4096 Oct 13 2008 scan
dr-xr-xr-x 23 specialforces specialforces 4096 Aug 11 18:40 specialforces
drwxr-xr-x 4 specialforcesgear specialforcesgear 4096 Feb 26 2008 specialforcesgear
lrwxrwxrwx 1 root root 13 Nov 19 2009 upload -> /home/client/
drwx—— 3 upload upload 4096 Nov 19 2009 upload-bak
# cat /etc/shadow