DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

Rothamsted Research Data Leak Insight and Analyst

Posted on June 13, 2013 by Lee J

rothamsted At the start of June a hacker using the handle Nairb had dumped a leak of information from Rothamsted Research. Back then at the time OpMonsanto was in full swing with global protests around the world which were aimed right at the research company’s like Rothamsted Research conduct. The leak of information was dumped as an compressed file which did not liked to be opened on windows so Linux came to the rescue, solving that little problem. after opening the compressed file i found that 1 main folder and 2 other files, 1 which discloses the vulnerability  and the other a full report of the extracted data. In the folder was 7 further folders each with anywhere between 2 to 30+ XLS files. Each folder represents a different database table. folders While researching this data i have come across confirming data and information that tests and experiments have been carried out all around the world on the follow products since the early 90’s and most likely before that to. – oilseeds

  • potatos
  • barely
  • wheat
  • sugar beets

After going over all the information i have found 1481 user and administrator credentials most of which are just user names and encrypted passwords but some have other credentials. The system was using open sources systems like wordpress and phpbb2 for blogs and forums. ### Gallery

### Data leak information

**Folder: **cdenholm File: Resistance2011Registration.xls Info: personal information with user names, real names, contacts, addresses and registreation details. **Folder:**183 **Folder: **enduauth **File: **user.xls **Info: **user credentials with user names and encrypted passwords ****Folder: ****111 **File: **user20Oct2010.xls **Info: **user credentials with user names and encrypted passwords **Folder: **528 **Folder: **enduvl **File: **userVL.xls **Info: **user credentials with user names and encrypted passwords **Folder: **556 **Folder: **phpbb2 **File: **phpbb_users.xls **Info: **full user credentials with full names, emails and encrypted passwords **Folder: **95 Folder: wordpress **File: **lime_users.xls **Info: **administration credentials with full names, user names, email addresses and encrypted passwords **Folder: **2 **File: **wp_users.xls **Info: **user names, email addresses and encrypted passwords **Folder: **6

Related Posts:

  • Rothamsted Research Hacked, Full Databases and…
  • Software Company Tom Sawyer Hacked, 61,000 Vendors…
  • Palestine ISP PALNET Hacked, client account and…
  • Software Company Tom Sawyer Hacked, 61,000 Vendors…
  • Insight into the HP China Data Leak

Post navigation

← GSA responds to FOI request
Did Auckland District Health Board overreact to privacy breach? →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Why we need legislation requiring more transparency in breach notices, Saturday edition (Bluefield University)
  • The EU’s Cyber Resilience Act Has Now Been Agreed
  • 60 credit unions facing outages due to ransomware attack on popular tech provider
  • Paris Criminal Court Dismissed Charges Against Platypus Hackers
  • NYS Comptroller Audit: North Tonawanda City School District – Information Technology (2023M-102)
  • NYS Comptroller Audit: Brentwood Union Free School District – Information Technology (2023M-83)
  • If you’re in Rock County, Wisconsin, do NOT read this post. Absolutely do not read this post.
  • PA: Great Valley School District Falls Victim to Ransomware Attack

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net