DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GhostShell, On the Record – “Team” GhostShell?

Posted on March 15, 2016 by Dissent

This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.”

We asked GhostShell about other members of Team GhostShell and how many there were, because frankly, one of us (yes, that would be me) suspected that the team was really a one-man operation. His answer seems to be depend on what you mean by “team,” but he mostly confirmed my suspicions:

The majority of every single hack accredited to TGS, no less than 99% was done by a single entity. GhostShell.

The thing about Team GhostShell is that it was this phenomenon where many people decided to join behind it and support the group in their own way. There are users that are viewed generally as members but are not. There are users that are considered to be directly involved with TGS but are not. The reasons why it never bothered me was simple. On one side they acted as camouflage and on the other hand, I as the founder had complete control over the group.

(There’s also the fact that some of the known accounts are either decoys or duplicates of the same person.)

Later, GS would admit to us that @MidasLab and @OphiusLab were two of his alternate identities, as well as DeadMellox (an identity he established merely to help him track references to his hacking via a Google search), and WhiteFox.

In addition to proof he had previously provided to us as to his identity, he gave us the login credentials for the @MidasLab and @OphiusLab Twitter accounts, and we were able to access and control those accounts. Here’s a screencap from when we were logged into the OphiusLab account:

OphiusLab_screencap
Logged in to @OphiusLab. Screencap credit: DataBreaches.net

As an interesting side note, OphiusLab was originally created, he said, for an operation or project involving the medical sector.  When we asked him why he never seemed to attack the medical sector, he replied:

Back in 2012 I was ready to get serious with medical targets. This was right after the WallStreet leak with MidasBank. So I came up with OphiusLab. And everything was set but while I was working on the targets I came to a somber conclusion; that hacking the medical sector is the closest thing a hacker could get to actually harming a person in real life. Forget about SCADA or any of that. Breaching inner hospital networks whether they’re on the net or forbidden intranet networks that because of stupid people were one way or another connected online made me understand that you could realistically alter records, prescriptions and anything else that was sensitive to the wellbeing of a patient.

Not gonna lie, at the time it scared me so I dropped it, in the first ophiuslab release I even switched the main leak with a server from MIT instead of hospital or medical facility data.

But there were many more identities, as he would later tell us:

I have over a thousand identities and who knows how many more online nicknames. I’m actually curious myself to see on my indictment how many of them there have been. Without any exaggeration if they put all of them from the usual networks I’ve been, at least the top ten pages will be just with my names. Lmao

Q: Was anyone associated with TGS ever arrested?

I thought one of them was in 2012 but I’m not sure anymore. I was completely certain at the time. It makes no difference though, we barely know anything about each other. I always kept it that way with the mantra “Never trust anyone, not even me!”

Interview Topics:

  • #OpRomania
  • Anonymous
  • MalSec
  • “Team” GhostShell?
  • More on Snitches, the Feds, and the Scene
  • Why did he really disappear in 2013?
  • On criticisms of “simple” hacks
  • Psychological Factors
  • Difficulty Finding Work and Risk of Arrest
  • If You Knew Then What You Know Now….

Related:

  • Snowflake Loses Two More Bids to Dismiss Data Breach Plaintiffs
  • US company with access to biggest telecom firms uncovers breach by nation-state hackers
  • Canada says hacktivists breached water and energy facilities
  • The 4TB time bomb: when EY's cloud went public (and what it taught us)
  • Some lower-tier ransomware gangs have formed a new RaaS alliance -- or have they? (1)
  • How a hacking gang held Italy’s political elites to ransom
Category: Commentaries and AnalysesHack

Post navigation

← GhostShell, On the Record – MalSec
GhostShell, On the Record – Snitches, Feds, and the Scene →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.