Anonymous hackers targeting online porn found something a little unexpected this week at their third target, 82 government employees were subscribed to the DigitalPlayground.com server.
Via:
According to Th3 Consortium, the discovery of government email addresses on the hacked server was a happy coincidence.
"We did not set out to expose gov't hypocrisy, but the hack itself exposed it." they wrote in a Twitter post responding to the IBTimes.
When asked why they choose to target video pornography sites, they tweeted in response, "We are pirates, what did you expect."
Th3 Consortium, a relatively new hacktivist arm of Anonymous has made its debut with these. First Brazzers was hit Mid-February and 350,000 usernames and passwords were stolen. Then YouPorn was targeted and the hackers came away with a million usernames and passwords.The hack also revealed that the most common passwords used on the porn site were '123456' (332 times) and 'password' (216 times).
The full message by Anonymous follows:
"We are The Consortium, and we have something special for our first release,"
You see for a while now we have had access to digitalplayground.com, one of the five biggest porn sites in the world. But it doesn't need an introduction from us.
This company has security that if we didn't know it was a real business, we would have thought to be a joke - a joke that we found much more amusing than they will.
"This site has so many freaking holes that if I didn't know it was a porn site, I would have mistaken it for a honeypot" - [Redacted]
We did not set out to destroy them but they made it too enticing to resist. So now our humble crew leave lulz and mayhem in our path. We not only have the 72k users of this site but also over 40k plaintext credit cards including ccvs, names and expiry dates. If you want to hear more about those plaintext credit cards scroll through the MySql info further down. And of course as this is a porn site there was no shortage of .mil and .gov emails in their user list.
We also went on and rooted four of their servers, as well as gaining access to their mail boxes. Using credentials from emails we tapped into their conference call. "Is anyone besides David on the line ?" - We were. Did we win? Sure looks that way.
Digital Playground game over.
So now lets bust out the fun stuff.