cell tower dumps

From: Roger at Bugsweeps <bugs..._at_earthlink.net>
Date: Tue, 3 Sep 2013 12:35:25 -0600

>From - Sat Mar 02 00:57:25 2024
Received: by 10.224.17.193 with SMTP id t1mr60182983qaa.4.1325469318877;
        Sun, 01 Jan 2012 17:55:18 -0800 (PST)
X-BeenThere: tscm-l2006_at_googlegroups.com
Received: by 10.224.116.194 with SMTP id n2ls12789292qaq.3.gmail; Sun, 01 Jan
 2012 17:55:15 -0800 (PST)
Received: by 10.224.179.67 with SMTP id bp3mr78824354qab.5.1325469315395;
        Sun, 01 Jan 2012 17:55:15 -0800 (PST)
Received: by 10.224.179.67 with SMTP id bp3mr78824351qab.5.1325469315375;
        Sun, 01 Jan 2012 17:55:15 -0800 (PST)
Return-Path: <areda..._at_msn.com>
Received: from snt0-omc2-s45.snt0.hotmail.com (snt0-omc2-s45.snt0.hotmail.com. [65.54.61.96])
        by gmr-mx.google.com with ESMTP id t29si37376413qcq.0.2012.01.01.17.55.15;
        Sun, 01 Jan 2012 17:55:15 -0800 (PST)
Received-SPF: pass (google.com: domain of areda..._at_msn.com designates 65.54.61.96 as permitted sender) client-ip=65.54.61.96;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of areda..._at_msn.com designates 65.54.61.96 as permitted sender) smtp.mail=areda..._at_msn.com
Received: from SNT107-W32 ([65.55.90.73]) by snt0-omc2-s45.snt0.hotmail.com with Microsoft SMTPSVC(6.0.3790.4675);
         Sun, 1 Jan 2012 17:55:15 -0800
Message-ID: <SNT107-W32B4E2B8F25565E5C19B5EBC910_at_phx.gbl>
Return-Path: areda..._at_msn.com
Content-Type: multipart/alternative;
        boundary="_0fb2d43f-22e2-4c36-be0d-def2a97ee68c_"
X-Originating-IP: [68.117.154.154]
From: Its from Onion <areda..._at_msn.com>
To: tscm-l2006 <tscm-..._at_googlegroups.com>
Subject: Anonymous exposes 75,000 credit card numbers
Date: Mon, 2 Jan 2012 01:55:14 +0000
Importance: Normal
In-Reply-To: <14dae934108792b4a004b581257c_at_google.com>
References: <14dae934108792b4a004b581257c_at_google.com>
MIME-Version: 1.0
X-OriginalArrivalTime: 02 Jan 2012 01:55:15.0114 (UTC) FILETIME=[921FE8A0:01CCC8F1]

--_0fb2d43f-22e2-4c36-be0d-def2a97ee68c_
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable














Anonymous exposes 75,000 credit card numbers


Posted: 01 Jan 2012 01:38 PM PST
washingtonpost.com

Hacker collective Anonymous has just dumped 200 GB of names, email addresse=
s and passwords for around 860,000 Stratfor users. Anonymous also exposed c=
redit card numbers for 75,000 paying customers of Stratfor.

Stratfor, a security think tank, provides reports on international security=
 and related threats to government and military personnel as well as to the=
 private sector. It is unknown whether Anonymous gained access to other, mo=
re sensitive information during the Stratfor hacks, which occurred on Decem=
ber 24.

=93The time for talk is over,=94 wrote Anonymous last night on Pastebin.

=93It=92s time to dump the full 75,000 names, addresses, CCs and md5 hashed=
 passwords to every customer that has ever paid Stratfor. But that=92s not =
all: we=92re also dumping ~860,000 usernames, email addresses, and md5 hash=
ed passwords for everyone who=92s ever registered on Stratfor=92s site=85 D=
id you notice 50,000 of these email addresses are .mil and .gov?=94

Anonymous=92 motives for the attack are also somewhat hazy. In last night=
=92s statement, representatives of the movement wrote, =93All our lives we =
have been robbed blindly and brutalized by corrupted politicians, establish=
mentarians and government agencies sex shops, and now it=92s time to take i=
t back.=94

In addition to the Stratfor attack and exposure, Anonymous is threatening a=
 new action on New Year=92s Eve, December 31.

More...
 =09=09 =09 =09=09 =20
--_0fb2d43f-22e2-4c36-be0d-def2a97ee68c_
Content-Type: text/html; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<style><!--
.hmmessage P
{
margin:0px;
padding:0px
}
body.hmmessage
{
font-size: 10pt;
font-family:Tahoma
}
--></style></head>
<body class=3D'hmmessage'><div dir=3D'ltr'>
<font face=3D"Times New Roman" size=3D"3" style=3D"font-size:12pt;"><br id=
=3D"FontBreak"></font><br><div><div id=3D"ecxemailbody" style=3D"font-famil=
y:Georgia,Helvetica,Arial,Sans-Serif;line-height:140%;font-size:13px;color:=
#000000"><table style=3D"border:0;padding:0;width:100%"><tbody><tr><td styl=
e=3D"vertical-align:top" width=3D"99%"><font face=3D"Tahoma" size=3D"2"><br=
></font>
</td>
<td width=3D"1%">
</td></tr>
</tbody></table>
<hr style=3D"border:1px solid #ccc;padding:0">
<table id=3D"ecxitemcontentlist">
<tbody><tr>
<td style=3D"margin-bottom:0;line-height:1.4em">
<p style=3D"">
<a name=3D"1" style=3D"font-family:Arial, Helvetica, sans-serif;font-size:1=
8px" href=3D"http://comsecllc.blogspot.com/2012/01/anonymous-exposes-75000-=
credit-card.html" target=3D"_blank">Anonymous exposes 75,000 credit card nu=
mbers</a>
</p>
<p style=3D"font-size:13px;color:#555;font-family:Georgia,Helvetica,Arial,S=
ans-Serif;line-height:140%;font-size:13px">
<span>Posted:</span> 01 Jan 2012 01:38 PM PST</p>
<div style=3D"font-family:Georgia,Helvetica,Arial,Sans-Serif;line-height:14=
0%;font-size:13px;color:#000000"><div class=3D"ecxseparator" style=3D"clear=
:both;text-align:center"><a href=3D"http://1.bp.blogspot.com/-Mas03Mu8f94/T=
wDRG7O96aI/AAAAAAAADnc/IG5TbP5aAMI/s1600/anonymous.jpg" style=3D"clear:left=
;float:left;margin-bottom:1em;margin-right:1em" target=3D"_blank"><img bord=
er=3D"0" height=3D"212" src=3D"http&#58;//1.bp.blogspot.com/-Mas03Mu8f94/Tw=
DRG7O96aI/AAAAAAAADnc/IG5TbP5aAMI/s320/anonymous.jpg" width=3D"320"></a></d=
iv><a href=3D"http://www.washingtonpost.com/business/technology/anonymous-e=
xposes-860k-stratfor-users-and-75k-credit-card-numbers/2011/12/30/gIQA5oXqQ=
P_story.html" target=3D"_blank">washingtonpost.com</a><br><br><div style=3D=
"margin-bottom:22px;margin-left:0px;margin-right:0px;padding-bottom:0px;pad=
ding-left:0px;padding-right:0px;padding-top:0px">Hacker collective Anonymou=
s has just dumped 200 GB of names, email addresses and passwords for around=
 860,000 Stratfor users. Anonymous also exposed credit card numbers for 75,=
000 paying customers of Stratfor.<br><br>Stratfor, a security think tank, p=
rovides reports on international security and related threats to government=
 and military personnel as well as to the private sector. It is unknown whe=
ther Anonymous gained access to other, more sensitive information during th=
e Stratfor hacks, which occurred on December 24.<br><br>=93The time for tal=
k is over,=94 wrote Anonymous last night on <a href=3D"http://pastebin.com/=
f7jYf5Wd" target=3D"_blank">Pastebin</a>.<br><br>=93It=92s time to dump the=
 full 75,000 names, addresses, CCs and md5 hashed passwords to every custom=
er that has ever paid Stratfor. But that=92s not all: we=92re also dumping =
~860,000 usernames, email addresses, and md5 hashed passwords for everyone =
who=92s ever registered on Stratfor=92s site=85 Did you notice 50,000 of th=
ese email addresses are .mil and .gov?=94<br><br>Anonymous=92 motives for t=
he attack are also somewhat hazy. In last night=92s statement, representati=
ves of the movement wrote, =93All our lives we have been robbed blindly and=
 brutalized by corrupted politicians, establishmentarians and government ag=
encies sex shops, and now it=92s time to take it back.=94<br><br>In additio=
n to the Stratfor attack and exposure, Anonymous is threatening a new actio=
n on New Year=92s Eve, December 31.<br><br><a href=3D"http://www.washington=
post.com/business/technology/anonymous-exposes-860k-stratfor-users-and-75k-=
credit-card-numbers/2011/12/30/gIQA5oXqQP_story.html" style=3D"font-family:=
Georgia, serif;line-height:1.5em" target=3D"_blank">More...</a></div><div c=
lass=3D"ecxblogger-post-footer"><img width=3D"1" height=3D"1" src=3D"https:=
//blogger.googleusercontent.com/tracker/1069009752883098184-415852316131387=
3633?l=3Dcomsecllc.blogspot.com" alt=3D""></div></div></td></tr></tbody></t=
able>
</div></div> =09=09 =09 =09=09 </div></body>
</html>
--_0fb2d43f-22e2-4c36-be0d-def2a97ee68c_--
Received on Sat Mar 02 2024 - 00:57:25 CST

This archive was generated by hypermail 2.3.0 : Sat Mar 02 2024 - 01:11:45 CST