wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/06\/26\/hacktivists-steal-government-files-from-texas-city-fort-worth\/<\/a><\/br> A hacktivist group broke into an online system belonging to the Texas city of Fort Worth, stole several gigabytes of data and posted it online.<\/p>\n On Saturday, Fort Worth officials admitted that it suffered a data breach, but said that after reviewing the leaked data, \u201cat this time, there is no indication that sensitive information related to residents or staff are a part of this incident,\u201d and that the data \u201cwas not sensitive and would be information releasable to the public through a Public Information Request.\u201d<\/p>\n In an online post on its official website<\/a>, the city said that the leaked data included \u201cattachments to work orders, including photos, spreadsheets, invoices, emails, PDF documents and other material related to work orders.\u201d<\/p>\n \u201cThere is no evidence at this time that any other systems were accessed, nor any evidence that sensitive data such as social security numbers, credit card or banking information was accessed, nor released,\u201d the post read.<\/p>\n The city said that an example of the stolen data is \u201cthe address of a home with a pothole in the City street in front of the home, that needs to filled, [sic] as well as a picture of the pothole.\u201d<\/p>\n A cursory review of the leaked files shows several pictures of potholes, tilted traffic signs or fallen traffic lights, and email messages between city employees. There is also a document that includes the names, work phone numbers and email addresses of Fort Worth\u2019s employees.<\/p>\n The hacktivist group goes by SiegedSec, and it claimed the hack on its Telegram channel, saying \u201cwe have decided to make a message towards the U.S government. Texas happens to be one of the largest states banning gender affirming care, and for that, we have made Texas our target. Fuck the government.\u201d<\/p>\n One of the hackers from SiegedSec, who goes by Vio, told TechCrunch that Fort Worth was an \u201copportunistic target.\u201d<\/p>\n \u201cWe were targeting any government domain associated with Texas, as Texas was our primary target,\u201d they said.<\/p>\n Vio explained that one of SiegedSec\u2019s main causes \u201care those for the rights of minority groups, particularly in 1st world countries. In particular, LGBTQ+ rights.\u201d<\/p>\n Valerie Colapret, a spokesperson for the city of Fort Worth, referred to the post the city published about the incident when asked for comment.<\/p>\n The city wrote that the hackers accessed \u201can internal information system, an application named Vueworks,\u201d by acquiring login credentials to it, although the city said it still doesn\u2019t know how the hackers got those credentials.<\/p>\n The city is asking users of the affected system to reset passwords, is reviewing \u201csources of information to determine the scope and depth of this incident specific to VueWorks,\u201d and it\u2019s working with law enforcement and computer forensic experts.<\/p>\n SiegedSec has a history of data breaches. Earlier this year, the group leaked data<\/a> stolen from software giants Atlassian, and workplace management services startup Envoy. Last year, with the goal of protesting abortion restrictions in the U.S., the group targeted the IP addresses of U.S. companies that had exposed industrial control systems (ICS) ports, according to cybersecurity firm Mandiant<\/a>.<\/p>\n This article was updated to include Fort Worth\u2019s response, as well as comments from one of SiegedSec\u2019s hackers.<\/em><\/p>\n Do you have information about SiegedSec or other hacktivist groups? We\u2019d love to hear from you. From a non-work device, you can contact Lorenzo Franceschi-Bicchierai securely on Signal at +1 917 257 1382, or via Wickr, Telegram and Wire @lorenzofb, or email lorenzo@techcrunch.com. You can also contact TechCrunch via SecureDrop.<\/em><\/p>\n<\/p><\/div>\n <\/br><\/br><\/br><\/p>\n
\nHacktivists steal government files from Texas city Fort Worth<\/br>
\n2023-06-26 21:49:01<\/br><\/p>\n
\n