The hacktivists' latest operation is called ProjectWhiteFox

Dec 10, 2012 12:51 GMT  ·  By

Team GhostShell returns with another massive data leak. On this occasion – which represents their last project for this year – they’ve leaked around 1.6 million account details from fields such as banking, law, education, military, government and aerospace, as part of a new project called ProjectWhiteFox.

The data dump originates from over 30 websites. The large quantity of information appears to come from the systems of organizations such as NASA, the European Space Agency, Crestwood Technology Group, Bigelow Aerospace, the California Manufacturers & Technology Association and Aerospace Suppliers.

Other targets are World Airport Transfers, General Dynamics Defense Systems, MicroController Shop, Human Security Gateway, Hamamatsu, a defense contractor for the Pentagon, Aquilent, Texas Bankers, VSoft and the Global Business Network.

The published information comprises names, usernames, email addresses, physical addresses, passwords, and other types of information usually stored on corporate websites.

The hackers have also leaked information that has allegedly been extracted from the systems of the Credit Union National Association. They claim that a total of 85 million people are at risk, but they’ve only published some limited details.

In their statement written next to the data leak, the hackers reveal the fact that they also support the hacktivist campaign against the International Telecommunication Union.

According to the members of Team GhostShell, they’ve also been aware of the fact that authorities have been tracking their every move. They claim they’ve managed to identify the websites used to monitor them by searching for “DeadMellox,” the name of Team GhostShell’s leader.

“‘DeadMellox’ was a ghost to begin with. Never exited. No, really. Before we created ‘him’, he never existed on the internet, zero searches on Google and all that jazz. Starting to get it now? We used the name afterwards to trackback all mentions of that name all over the place,” they explained.

They added, “It really was fascinating to see how everything developed all these months. How we went from 'cyber-criminals' to 'hacktivists' to 'e-terrorists' to 'bad actors' to blacklisted.”