The hackers also say they breached the site of a UK town council

Aug 29, 2012 11:45 GMT  ·  By

A few days ago, the members of the NullCrew collective published a document containing information allegedly stolen from the systems of Cambridge University. The educational institution’s representatives are currently investigating their claims.

“There is much more where this came from, and don't think this is the end. NullCrew, along with the whole Anonymous movement isn't near finished with you. And we never will be, until the right thing is done with Julian Assange. Next time it will be worse, we guarantee it,” the hackers wrote.

The leaked information consists of usernames and passwords (some of which in clear text) apparently stolen from domains such as the ones of the Sector of Biological and Soft Systems, Hamilton Kerr Institute – Fitzwilliam Museum, and three others.

Three of the domains – como.cheng.cam.ac.uk, saffron.caret.cam.ac.uk, and crassh.cam.ac.uk – have been taken offline while the incident is investigated.

“We are aware of the NullCrew claims and investigations are under way,” a university spokesperson said.

However, there is no evidence to indicate that email login details have not been compromised.

The same hacker group claims to have breached the official website of the Townbridge Town Council (townbridge.gov.uk). As a result of the breach, the administrator’s credentials (username and password hash) have been published, along with the site’s database. However, the database doesn’t contain any sensitive information.

Both these hacks are apparently part of Operation Free Assange, a campaign whose main goal is to convince the United Kingdom government to allow the WikiLeaks founder free passage to Ecuador, the country that recently granted him asylum.

Other targets of this operation are the site of the Interpol, UK Home Office, Ministry of Justice, Prime Minister’s Office, Department for Work and Pensions, and the one of MP Peter Hain.