DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Parametric Technology Corporation Breached, 1753 Account Credentials Leaked

Posted on May 30, 2013 by Lee J

ptc_front_page_cwn A hacker using the handle @st0rmyw0rm has today posted a breach from a software development company Parametric Technology Corporation (https://www.ptc.com). PTC is a US based business which develops, markets and supplies software in the development field. >  Its main products are for CAD/CAM, engineering calculations, and product lifecycle management. Its customers include companies in manufacturing, publishing, services, government and life sciences industries. PTC is listed in the S&P Midcap 400. It is also in the Russell 2000 index. Its tagline is "Product And Service Advantage" from wikipedia

The breach was announced on the 29th of may 2013 from the hackers main twitter account and has been posted to pastebin in the format of a SQLi extraction format he sites database st0rmyw0rm-parametric-technology The leaked information from the breach totals 2000 accounts of which 1753 are found to be non duplicated. Some of the accounts are also incomplete without full credentials. ptc-com-leaked-pastebin-com_   The rest of the accounts have usernames which appear to be users first and last name connected with a "." ie: example.name. Other credentials include email addresses and encrypted passwords. st0rmyw0rm is a collective of hackers who are not apart of Anonymous except one of their members who is a well known anonymous hacktivist. CWN has been alerted to further incoming leaks from other breaches today which should be published by the hackers soon.

Related Posts:

  • Lookitsme Breached, 4294 Accounts leaked From…
  • Beypazari State Hospital hacked, data leaked by…
  • Compoundsemiconductor.net Breached By @st0rmyw0rm,…
  • Mitsubishi Heavy Industries claims to of been hacked…
  • Update on Lookitsme Breach, Statement and updates

Post navigation

← Utah DMV reveals data breach discovered in March
California agencies’ clients vulnerable to ID theft →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • The Untold Story of a Massive Hack at HHS in Covid’s Early Days
  • Records reveal new information about Sweetwater Union High School District ransomware incident
  • HHS’ Office for Civil Rights Settles First Ever Phishing Cyber-Attack Investigation
  • Founder and Majority Owner of Cryptocurrency Exchange Pleads Guilty to Unlicensed Money Transmitting
  • Hackers hit Erris water in stance over Israel
  • Data breach by Addenbrooke’s Hospital reveals patient information
  • Millions of patient scans and health records spilling online thanks to decades-old protocol bug
  • Cybersecurity: Federal Agencies Made Progress, but Need to Fully Implement Incident Response Requirements (GAO Report)

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net