BreachExchange mailing list archives
fringe: German Federal Police servers compromised
From: security curmudgeon <jericho () attrition org>
Date: Tue, 12 Jul 2011 02:40:29 -0500 (CDT)
---------- Forwarded message ---------- From: InfoSec News <alerts () infosecnews org> http://www.h-online.com/security/news/item/German-Federal-Police-servers-compromised-1276115.html The H-Security 8 July 2011 A group calling itself NN-Crew says it has broken into a server used by Germany's Federal Police and stolen a large amount of data used to GPS-track suspects under surveillance. The police apparently used the hacked server as a data pool and server to download GPS tracking software; it also contained instructions for installation and operation of that software. Criminal investigators require authentication for server access. The surveillance data published by NN-Crew included several usernames and passwords along with telephone numbers, license plate numbers, locations, and coordinates. Numerous internal documents used by the authorities were also stored on the server. A spokesperson for the German Federal Police said that an "analysis conducted by our executive committee revealed that no investigation data used by the Federal Police (or by the Federal Criminal Police Office) was published. As far as we can tell at the moment, the data published came from a server used by customs officials, which apparently also contained information from the Federal Police on the use of the PATRAS tracking system for distribution among customs officials." The spokesperson also said that the server of the PATRAS geo-data system has been temporarily switched off for security reasons and that all users have been informed. The spokesperson added that the Federal Police are currently working with customs officials to check whether the data contained any critical information. The National Cyber Defence Centre at Germany's Federal Office for Information Security will also be looking into the matter. The event is especially embarrassing for customs officials, who are probably at fault, because they themselves are (associated) members of the Cyber Defence Centre. [...] _______________________________________________ Dataloss Mailing List (dataloss () datalossdb org) Archived at http://seclists.org/dataloss/ Unsubscribe at http://datalossdb.org/mailing_list Learn encryption strategies that manage risk and shore up compliance. Download Article 1 of CREDANT Technologies' The Essentials Series: Endpoint Data Encryption That Actually Works http://credant.com/campaigns/realtime2/gap-LP1/
Current thread:
- fringe: German Federal Police servers compromised security curmudgeon (Jul 14)
