The information they claim to have stolen from the websites raises a lot of questions
Hackers part of the NullCrew collective continue to take aim at high profile websites as part of their operation against governments from all over the world.Their latest targets are The Department of Defense Pharmacoeconomic Center (pec.ha.osd.mil), Department of Defense (defense.gov), the US National Security Agency (NSA), MasterCard, and the BB&T bank.
For each one of these websites they have published some information.
“We here at NullCrew believe in non-censorship, and have noticed something. We have noticed that the government will never change their ways, they simply refuse to,” they wrote next to the data leak.
“No matter how much violence they cause, no matter how many times they refuse to admit their wrongs. No matter how many times they have denied documents for being factual.”
From the website of The Department of Defense Pharmacoeconomic Center they have leaked base and unit names, addresses, phone numbers, DSN numbers and fax numbers.
Email addresses, names of users, phone numbers, jobs, and special operation details appear to have been taken from defense.gov.
“Sensitive server” details that belong to BT&T, MasterCard and NSA have also been published online. From MasterCard systems they also claim to have taken email addresses, user names and administrator credentials.
However, experts have told Softpedia that none of the pieces of information leaked by the hackers is actually sensitive. For instance, the details allegedly taken from the Department of Defense Pharmacoeconomic Center are publicly available to anyone.
The defense.gov email addresses and other user details also appear on various other websites, including ones operated by the US government and some educational institutions.
The information they claim to have stolen from MasterCard is freely available on a number of different websites that have nothing to do with hacking.
The email addresses allegedly associated with MasterCard and the company’s employees have been previously published around two weeks ago by a different group, but a lot of questions can be raised regarding their legitimacy.