Guy Fawkes Day – LulzSec Italy hit numerous organizations in Italy

Pierluigi Paganini November 09, 2018

Guy Fawkes Day, November 5th 2018 – LulzSec Italy announced credit a string of hacks and leaks targeting numerous systems and websites across Italy.

In celebration of Guy Fawkes Day, November 5th 2018, LulzSec Italy announced credit for a massive string of hacks and leaks targeting numerous systems and websites across Italy. Included in the breaches were Italy’s National Research Center, The Institute for Education Technologies, the ILIESI Institute for the European Intellectual Lexicon, National Mining Office for Hydrocarbons and Geo-resources, Ministry of Economic Development, State Police Association, Fratelli D’Italia, Lega Nord Trentino, Partito Democratico Siena, TV Trentino, Technapoli Equitalia, State Archives S.I.A.S., Italian Military Personnel and National Association of Professional Educators.

Exposed in the Hack:

National Research Center

38 Databases Total: https://ghostbin.com/paste/3b54x

Login information for 37 administrators, including full names, username, password and email: https://ghostbin.com/paste/a5og7/raw

11 Usernames, Passwords & Emails for Database eSG: https://ghostbin.com/paste/wuo32/raw

110 Usernames, Passwords & Emails for Database exe: https://ghostbin.com/paste/avbkc/raw

40 Usernames, Passwords & Emails for Database exe2: https://ghostbin.com/paste/4r9hb/raw

41 Names & emails in ENHANCE datbase: https://ghostbin.com/paste/mo698/raw

91 Names & Emails in PERSONALE database: https://ghostbin.com/paste/46wsg/raw

1 Username for Database artico: https://ghostbin.com/paste/8ox25/raw

88 Login Usernames, User-Emails & Passwords in iTreasure Database: https://ghostbin.com/paste/rnw8v/raw

1 Username and Password In Database itd_cp: https://ghostbin.com/paste/kazwa/raw

12 Full Names, User Names, Emails & Passwords In Database DEL_GB: https://ghostbin.com/paste/6gc2t/raw

National Research Center’s Public Relations Office

6 Databases Total: https://ghostbin.com/paste/br6dz/raw

119 Director Names, Emails, Phone Numbers & Web Addresses: https://ghostbin.com/paste/m2qqt/raw

20 Entries in Database URP: https://ghostbin.com/paste/padtr/raw

6 Usernames & Passwords for Database URP3: https://ghostbin.com/paste/bvgo5/raw

The ILIESI Institute for the European Intellectual Lexicon

53 Databases Total: https://ghostbin.com/paste/8f8cx/raw

21 Usernames, ID’s & Passwords: https://ghostbin.com/paste/hghno/raw

National Mining Office for Hydrocarbons & Geo-resources

Hackers were able to obtain 97 un-encrypted passwords, emails, telephone numbers, virtual hosts.

Database Available Here: https://privatebin.net/?5a86dad981f2d6f9#Ukj5nmvQIC1kLX1edpGFeC/wioRCvFb7ZmzTA9moe5I=

Ministry of Economic Development

Database: Microsoft_Access_masterdb | Providencal Names & Codes: https://privatebin.net/?a4a7de0e8cb245fc#6/d78r8LZy/alRQy3bxWrtyUL5BYbVuD+Q1m8IsbSqQ=

MassaCarrara Web Archives

Administrator Username & Password To Access Archive: https://privatebin.net/?15ef871304a0afbb#Kab64MBuAfUsbF3KFqmTFe+oVRgwplgDCN3j4J7SphQ=

State Archive of Palermo

Archive Administrative Usernames & Password: https://privatebin.net/?60a9f630e84d80cd#s6C3Nc3ShoWmnRKk9OwyFUqcFGAFBFVBzkFbgwETtds=

State Police Association

Hackers were unable to obtain the administrator logins, including username, email and password for access, uncovering the personal information of active duty police officers, including identifiable information such as their emails, social profiles, addresses, telephone numbers and account passwords.

Leaked Archive: https://privatebin.net/?dd853aafa2b0f62e#fRgrEVeROh0C3ELBhRe84b7cDinrK0pAB99mL0L9/AU=

Fratelli D’Italia

1,348 Logins Including Emails & Passwords: https://privatebin.net/?66aec26235951cc4#zKzlhUGg7ocCScrpDt5CoUUUKSPeg+sizdZIWjxcQIk=

MySQL Database Download 1: https://anonfile.com/e3d44bkbbc/62.149.150.232_new_zip

MySQL Database Download 2: https://anonfile.com/371b2ak7b8/csv_zip

Lega Nord Trentino

23 ID’s Full Names & Emails: https://privatebin.net/?ac1fe0253ec5c246#Ugm1LH48BhQHRQww1Lyhz2Kde6dnKQLUsjsCnmIdoE8=

Partito Democratico Siena

10 User Names, Emails & Logins – Including Administrators: https://privatebin.net/?1a64142b69fd878e#9rFxpJ6SU4+4/0VHiY/RJuZpeJ8CZ/1XfuZDoRkRttM=

TV Trentino

Administrator Username & Login for SQL Database: https://privatebin.net/?8ea9f6164459e30c#IagLjHmq5SMtVDKVqU9LreqAyyLQLIG22Mb4Qow+p1E=

Technapoli Database Equitalia

Login Usernames & Passwords: https://privatebin.net/?203a23eda7af9f45#duOcGV3ddonatzdwS1OP/2J9XOhJPqUGqJkpLYpmUe4=

Database Download: https://anonfile.com/CfE8X2jdb3/PrivateBin_txt

State Archives S.I.A.S.

20,430 Entries – Including User ID’s, Usernames, Full Names, Emails & Passwords: https://privatebin.net/?15c4f79c65b535e8#4DgeRlqU70w4WOe005a/zUWv/fcI+ulNyGSCDg4zKhw=

Military Personnel

Close to 2,000 Names, Surnames, Emails, Passwords: https://privatebin.net/?f2c74c12c80ce9c6#NDF1vtOG/OrgWlUYkJIVGcgVnyY/mknfybdNaTtrEGg=

National Association of Professional Educators

2,200 Usernames, ID’s, Passwords & IP Addresses: https://privatebin.net/?6318b912efe082f9#9Nd4K/49a9vTVQ0nbWmhPM7PRRN5Ls+UNv5sybOLGeQ=

About the Author: Brian Dunn

Brian Dunn is a writer & researcher formally working as a content specialist for AnonHQ throughout 2015-2016. Today Brian Dunn owns and operates Rogue Security Labs, a small-time online security service and Rogue Media Labs, a news/media startup attempting to change the way people read & consume cyber news/education.

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs – LulzSec Italy, hacktivism)

[adrotate banner=”5″]

[adrotate banner=”13″]



you might also like

leave a comment