Team Berserk has published the details of around 5,000 customers

Oct 28, 2013 12:10 GMT  ·  By

Earlier this month, hackers of TeamBerserk published a video to prove that they gained access to the systems of California-based ISP Sebastian.

The company has denied finding any evidence of a breach.

“On October 22, 2013 Sebastian Corp. was notified that an online hacker group was claiming to have breached Sebastian’s system and gained access to customer usernames and passwords. We have checked with our providers and their records indicate that no such attack has occurred,” the company stated.

After seeing Sebastian’s statement, the hackers uploaded a shell to the Internet provider’s website to demonstrate that they had access to its servers.

Since the company hasn’t admitted being hacked, even after being provided with clear evidence of a breach, TeamBerserk decided to leak data taken from its systems.

“We TeamBerserk have remote access to nearly every Sebastian ISP customer's home Computers, Android/iPhone SmartPhones, Business Computers, etc. And we use these systems for multiple purposes and as part of our #DragonSlayer Nets,” the hackers said.

They added, “We TeamBerserk do not generally deface systems, but in this case we have defaced the Sebastian.net front page many times already to alert their customers that they are in fact compromised, however, Sebastian is exceedingly quick to remove the defacement and change the root credentials.”

The data they’ve published on Pastebin and Hackersbin.com consists of the email addresses, usernames, and clear text passwords of around 5,000 Sebastian customers.

We reached out to Sebastian Corp. last week, shortly after the hackers uploaded a shell to their website. However, so far, they haven’t responded to our inquiry.

Team Berserks says that some of Sebastian's customers are targets of their OpPedoKillers operation, a campaign aimed at those who have accessed indecent content featuring children.

“Essentially in our recon operation on the Sebastian user-base home computer systems we came across file names in our enumeration of their systems and found CP,” the hackers noted.

“After this was found we closely monitored the activities of those systems and we then remotely activated the Web Camera hardware attached to their systems.. you should know what comes next. These video proofs will be uploaded shortly.”