Huge Anonymous data dump that caused Boxing Day panic mostly recycled and old information

The cache included 13,000 passwords and credit card details from Amazon, PlayStation and Xbox —but looks mostly to have been old data

Andrew Griffin
Tuesday 30 December 2014 11:04 EST
Comments
The study found that less than a third of key staff had the skills or technology to address a threat expected to expand over the next three years
The study found that less than a third of key staff had the skills or technology to address a threat expected to expand over the next three years (Rex)

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

A huge cache of personal and sensitive data released online on Boxing Day looks mostly to be recycled from old leaks, according to experts.

The group claimed to be affiliated with Anonymous and leaked 13,000 passwords and usernames in the dump. It also contained credit card details from Amazon, PlayStation and Xbox.

A lot of the data in the leak goes back to 2011 and 2012 and very little of it is new, Ken Westin, a senior security analyst at Tripwire, told The Register.

While anyone who suspects they may have been hit by the attack should take the same precautions of changing passwords and watching for suspect activity — that should be routine vigilance to stay safe, rather than any special response to the leak.

Much of the data looked to have been taken from a website called Leakforums.net, which stored stolen logins and passwords. The credit card details also seemed to have been taken from old leaks, he said.

He also said that the didn’t have the usual characteristics of an anonymous attack, despite it being posted from a Twitter account supposedly affiliated with the group.

The Twitter account claimed that the cache had been leaked “for the lulz”, in a now deleted post.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in