In celebration of Guy Fawkes Day, November 5th 2018, LulzSec Italy announced credit for a massive string of hacks and leaks targeting numerous systems and websites across Italy. Included in the breaches were Italy’s National Research Center, The Institute for Education Technologies, the ILIESI Institute for the European Intellectual Lexicon, National Mining Office for Hydrocarbons and Geo-resources, Ministry of Economic Development, State Police Association, Fratelli D’Italia, Lega Nord Trentino, Partito Democratico Siena, TV Trentino, Technapoli Equitalia, State Archives S.I.A.S., Italian Military Personnel and National Association of Professional Educators.
38 Databases Total: https://ghostbin.com/paste/3b54x
Login information for 37 administrators, including full names, username, password and email: https://ghostbin.com/paste/a5og7/raw
11 Usernames, Passwords & Emails for Database eSG: https://ghostbin.com/paste/wuo32/raw
110 Usernames, Passwords & Emails for Database exe: https://ghostbin.com/paste/avbkc/raw
40 Usernames, Passwords & Emails for Database exe2: https://ghostbin.com/paste/4r9hb/raw
41 Names & emails in ENHANCE datbase: https://ghostbin.com/paste/mo698/raw
91 Names & Emails in PERSONALE database: https://ghostbin.com/paste/46wsg/raw
1 Username for Database artico: https://ghostbin.com/paste/8ox25/raw
88 Login Usernames, User-Emails & Passwords in iTreasure Database: https://ghostbin.com/paste/rnw8v/raw
1 Username and Password In Database itd_cp: https://ghostbin.com/paste/kazwa/raw
12 Full Names, User Names, Emails & Passwords In Database DEL_GB: https://ghostbin.com/paste/6gc2t/raw
6 Databases Total: https://ghostbin.com/paste/br6dz/raw
119 Director Names, Emails, Phone Numbers & Web Addresses: https://ghostbin.com/paste/m2qqt/raw
20 Entries in Database URP: https://ghostbin.com/paste/padtr/raw
6 Usernames & Passwords for Database URP3: https://ghostbin.com/paste/bvgo5/raw
53 Databases Total: https://ghostbin.com/paste/8f8cx/raw
21 Usernames, ID’s & Passwords: https://ghostbin.com/paste/hghno/raw
Hackers were able to obtain 97 un-encrypted passwords, emails, telephone numbers, virtual hosts.
Database Available Here: https://privatebin.net/?5a86dad981f2d6f9#Ukj5nmvQIC1kLX1edpGFeC/wioRCvFb7ZmzTA9moe5I=
Database: Microsoft_Access_masterdb | Providencal Names & Codes: https://privatebin.net/?a4a7de0e8cb245fc#6/d78r8LZy/alRQy3bxWrtyUL5BYbVuD+Q1m8IsbSqQ=
Administrator Username & Password To Access Archive: https://privatebin.net/?15ef871304a0afbb#Kab64MBuAfUsbF3KFqmTFe+oVRgwplgDCN3j4J7SphQ=
Archive Administrative Usernames & Password: https://privatebin.net/?60a9f630e84d80cd#s6C3Nc3ShoWmnRKk9OwyFUqcFGAFBFVBzkFbgwETtds=
Hackers were unable to obtain the administrator logins, including username, email and password for access, uncovering the personal information of active duty police officers, including identifiable information such as their emails, social profiles, addresses, telephone numbers and account passwords.
1,348 Logins Including Emails & Passwords: https://privatebin.net/?66aec26235951cc4#zKzlhUGg7ocCScrpDt5CoUUUKSPeg+sizdZIWjxcQIk=
MySQL Database Download 1: https://anonfile.com/e3d44bkbbc/126.96.36.199_new_zip
MySQL Database Download 2: https://anonfile.com/371b2ak7b8/csv_zip
23 ID’s Full Names & Emails: https://privatebin.net/?ac1fe0253ec5c246#Ugm1LH48BhQHRQww1Lyhz2Kde6dnKQLUsjsCnmIdoE8=
10 User Names, Emails & Logins – Including Administrators: https://privatebin.net/?1a64142b69fd878e#9rFxpJ6SU4+4/0VHiY/RJuZpeJ8CZ/1XfuZDoRkRttM=
Administrator Username & Login for SQL Database: https://privatebin.net/?8ea9f6164459e30c#IagLjHmq5SMtVDKVqU9LreqAyyLQLIG22Mb4Qow+p1E=
Login Usernames & Passwords: https://privatebin.net/?203a23eda7af9f45#duOcGV3ddonatzdwS1OP/2J9XOhJPqUGqJkpLYpmUe4=
Database Download: https://anonfile.com/CfE8X2jdb3/PrivateBin_txt
20,430 Entries – Including User ID’s, Usernames, Full Names, Emails & Passwords: https://privatebin.net/?15c4f79c65b535e8#4DgeRlqU70w4WOe005a/zUWv/fcI+ulNyGSCDg4zKhw=
Close to 2,000 Names, Surnames, Emails, Passwords: https://privatebin.net/?f2c74c12c80ce9c6#NDF1vtOG/OrgWlUYkJIVGcgVnyY/mknfybdNaTtrEGg=
2,200 Usernames, ID’s, Passwords & IP Addresses: https://privatebin.net/?6318b912efe082f9#9Nd4K/49a9vTVQ0nbWmhPM7PRRN5Ls+UNv5sybOLGeQ=
About the Author: Brian Dunn
Brian Dunn is a writer & researcher formally working as a content specialist for AnonHQ throughout 2015-2016. Today Brian Dunn owns and operates Rogue Security Labs, a small-time online security service and Rogue Media Labs, a news/media startup attempting to change the way people read & consume cyber news/education.
(Security Affairs – LulzSec Italy, hacktivism)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.