Concelho Municipal de Ivoti, Camara Municipal de Afonso Cláudio & Câmara Municipal de Indaial Hacked/Defaced by Backbone Squad

Throughout the course of the new year a new group of hackers going by the name of “Backbone Squad” has been trying to make a name for themselves inside the Brasilian hacking scene. To do so, the group has announced a string of three separate hacks and data leaks effecting the Municipal County of IvotiMunicipal Chamber of Afonso Claudio and Indaial City Council of Indaial, Brasil. 

In 3 separate postings to Twitter between the dates of January 2nd to 4th 2019, Backbone Squad released access to the contents of 3 databases affiliated with the Government websites through the Ghostbin web service – access to which you can find below. While the hackers did not disclose the primary means through which they compromised the sites, considering that the hackers did not attempt notify the Government agencies alerting them to the hack, all of the credentials listed below should remain active for at least a short period of time.

Municipal County of Ivoti:

Target: hxxp://ivoti.rs.gov.br
Data Leak: https://ghostbin.com/paste/gggse

The leak provides access to the websites back end, exposing the login username and password for 4 site administrators. Using this, you can gain access to the sites databases, featuring the login user name and passwords for 100 site users, as well as the personal contact information, including emails, of 128 staff members – along with much more.

Municipal Chamber of Afonso Claudio:

Target: hxxp://www.cmac.es.gov.br/
Data Leak: https://ghostbin.com/paste/efvrz

The leak provides the login username and password of 4 website administrators, providing access to databases hosting the email addresses and personal contact information of 255 registered users of the website – along with a ton of other information.

No photo description available.

Indaial City Council:

Target: hxxp://camaraindaial.sc.gov.br
Data Leak: https://ghostbin.com/paste/ssuvb

The leak includes the login username and password of 3 website administrators, granting access to site databases featuring the login user names and passwords of 30 registered site users.

No photo description available.

Image may contain: text



Categories: Hacking News

Tags: , , , , , , ,

Leave a Reply

Your email address will not be published.

Do NOT follow this link or you will be banned from the site!
%d bloggers like this: