The breaches are part of Team GhostShell’s Project HellFire

Aug 27, 2012 06:57 GMT  ·  By

Unlike other hacker collectives which breach websites and immediately tell the world about their accomplishment, Team GhostShell prefers to target multiple websites before unveiling their work. They claim to have breached over 100 sites worldwide, leaking a total of around 1 million record sets.

The hacks are part of Project HellFire and they have been done in collaboration with MidasBank and OphiusLab.

According to the statement released by Team GhostShell, the list of targets includes real estate agencies, weapons dealers, police departments, consulting firms, corporations and various companies from sectors such as banking, aviation, politics, robotics, stock exchange, travel, military, education, and public affairs.

Files containing usernames, email addresses, passwords and other information have been posted online, apparently taken from organizations such as CIA Services (unrelated to the Central Intelligence Agency), Garret Group, Thailand’s Navy, Triage Consulting, Lion Capital, Commerce Bank of Wyoming, Chesley Consulting and the European Strabismological Association.

“Team GhostShell's final form of protest this summer against the banks, politicians and for all the fallen hackers this year. With the help of it's sub-divisions, MidasBank & the newest branch, OphiusLab,” DeadMellox, the leader of the team, said.

“One million accounts/records leaked. We are also letting everyone know that more releases, collaborations with Anonymous and other, plus two more projects are still scheduled for this fall and winter. It's only the beginning.”

Furthermore, the hackers claim to possess “access points” to “six billion databases from a Chinese mainframe full of Chinese and Japanese technology”, “over 105 billion databases to a US stock exchange mainframe” and “3-4 different servers belonging to the Department of Homeland Security.”

Since in some cases passwords have been leaked, we will not be providing a link to the files. We checked a few of them and they seem to be legitimate, especially considering that none of the affected organizations can be considered high-profile.