Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Wednesday, May 22, 2013

Did Lieutenant General Bonginkosi Solomon Ngubane of the South African Police Service (SAPS) Lie to South Africa?

While writing this I am honestly shocked. Lieutenant General Bonginkosi Solomon Ngubane of the South African Police Service (SAPS) as come out and (what looks like)...directly lied to the public of South Africa. I am using harsh words like, "lie" because this is something I can directly and empirically prove.


First some context. Yesterday I wrote about the hacker @DomainerAnon  hacking the SAPS website. At the time the hacker thought he was just going after SAPS data but he inadvertently dumped a lot of sensitive whistleblower information which has put the lives of many innocents at risk.

 So this afternoon I am busy reading my news feeds and a headline comes up stating that Lieutenant General Bonginkosi Solomon Ngubane of the South African Police Service has said that no sensitive data was leaked.  I will quote verbatim from the popular MyBroadBand website:
No criminal information or case information was compromised at all,” Lieutenant General Bonginkosi Solomon Ngubane told journalists."
Anyone with half a technology wit can prove that Mr Ngubane is misrepresenting the truth. Let me make the case. I have visited one of the mirrors where the hacked data is stored and will quote some heavily retracted comments from it. 
The above person is a prostitute who will be travelling with 2 men between Johannesburg, South Africa and CENSORED. She is a drug mule and will be carrying a large amount of cocaine. This will happen within the next 30 days. Her ID number is CENSORED.
There's a gentleman staying in CENSORED who sells drugs. Mostly dagga and cocaine. He runs CENSORED and also trains kids at his house. His name is CENSORED. ADDRESS CENSORED his phone number is CENSORED 
Drugs is being sold from this address from the CENSORED  in the back yard at this address. the suspect is also known to walk around with a fire arm a 38 special revolver.tik,dagga and heroin are his drugs that he sell to the young people of the area  
On the above mentioned date my younger sister age 16 was nearly rape and she was rescured by member of the public, when we went to the police station to open a case of attempted rape constable CENSORED and her superior inspector CENSORED told us that there was no panty torn so there is no way they can open a case,
All the quotes above represent but a tiny portion of the 16 000 reports and complaints of the hacked database. All the records come with additional information like telephone numbers, addresses and ID numbers (which for obvious reasons I have not included).

Mr Ngubane tries to pretend the data is not sensitive by saying:
Furthermore, the information that was accessed was the following;
o Information that is published usually, and
o Names and contact details of divisions and provinces, which is made public on the website in any case.
It does not take a rocket scientist to see that Lieutenant General Bonginkosi Solomon Ngubane is deceiving the public about the scope of the hack. A lot of very sensitive information was released and I would assume that in the 16 000 records... more than a few of those are open criminal investigations.

I have lost a lot of faith in the South African Police Force since this incident. An investigation into the SAPS and their inability to protect sensitive data should be started immediately.

UPDATE: The hacker  has since read this article and responded with;
@safrikaan and I thoroughly agree with your article...
—Domainer V2 (@DomainerAnon) May 22, 2013
UPDATE: This is the full press released by SAPS

MEDIA STATEMENT MEDIA STATEMENT ISSUED BY THE DIVISIONAL COMMISSIONER OF TECHNOLOGY MANAGEMENT SERVICES, LIEUTENANT GENERAL BONGINKOSI SOLOMON NGUBANE ALLEGED HACKING OF THE WEBSITE OF THE 
SAPS At about 10:00 on Tuesday, 21 May 2013, the State information Technology Agency (SITA) informed the SAPS that the website of the SAPS had been breached and that information had been obtained unlawfully.
SITA hosts and manages the website of the SAPS separately from the rest of the corporate systems of the SAPS. For this reason, no criminal information or case information was compromised at all. In fact, the corporate systems of the SAPS are hosted in a building in the Pretoria CBD, while the website of the SAPS is hosted in the data centre of SITA in Centurion. They are, therefore, hosted in completely different buildings with no link between the two.
The SAPS can state that no case information or classified information was compromised as this information resides in the mainframe systems of the SAPS, which is hosted separately from the website.
The SAPS has made a facility available on the website where a person may log a request to be addressed by a specific station or division or merely give a compliment. The person may log the request either with a name and contact detail or anonymously, depending on his/her choice. The persons who submitted their names and contact details made it available in order for a representative of the SAPS to contact them. This list was also available for the people who hacked into the website.
SITA has since addressed the security on the above details.
Furthermore, the information that was accessed was the following;
o Information that is published usually, ando Names and contact details of divisions and provinces, which is made public on the website in any case.
Hacking the website of the SAPS will always be a matter that the hacker community will strive to achieve and therefore the website of the SAPS and the corporate systems of the SAPS are hosted on completely different networks and therefore no corporate information of the SAPS will be compromised if and when the website is accessed unlawfully.

UPDATE: Annelize van Wyk Parliament's Police portfolio Committee Acting Chairperson has since responded to this article:

Monday, October 25, 2010

MWEB - Hacked and lying

So there I was, enjoying my Monday at work (okay, so I was not enjoying it that much... I was more sliding into the week as slowly as possible) when all of a sudden an interesting thread pops up in South Africa`s most popular online forum, MyBroadBand.co.za):

http://mybroadband.co.za/vb/showthread.php/278603-Mweb-business-accounts-hacked?highlight=

The thread was about a major hack that happened to one of our largest ISP (Internet Service Providers) MWEB. The hack was posted on the security website Seclists.org which is part of Insecure.org. Both are security based websites.

Now there have being a couple of hacks lately so I was not at all surprised about this one. Sure it was a big hack but the data contained in it was not too sensitive. What caught my attention on this was in the different ways the big corporations that got hacked went about handling this.

Recently a major hosting company called Heztner was hacked in South Africa. Thousands of clients had to change tens of thousands of passwords after a major security breach at their company. The company was pretty responsible in its response. The first their clients knew of this was when Hetzner contacted their clients and informed them of the hack and what changes needed to happen. They explained how the hack happened and dealt with it maturely.

The way the Mweb hack was handled was terrible. The first Mweb Business customers heard of the hack was through the MyBroadBand thread linking back to Seclists.org. Mweb`s first reaction was to have the link removed. Then according to some MWEB users on the MyBB forums... access to Seclists.org was temporarily terminated. Shortly after that MyBroadBand released the first news article about the hack:

http://mybroadband.co.za/news/adsl/16073-MWEB-Business-ADSL-Hacked.html

Shortly after that NEWS24 (Napsters owns NEWS24 and MWEB) released a news report:

http://www.news24.com/SciTech/News/MWEB-hacked-20101025

However, this is where things go wrong. Duncan Alfreds interviews MWEB CEO Rudi Jansen about the hack and Rudi Jansen is less than honest about the hack. First off he tries deflection. In the News24 article you see him blaming Internet Solutions (one of MWEBs upstream bandwidth providers) , then the interview goes on where Rudi Jansen tries to speculate at the origin of the hacker. The hacker uses the word, "negroland" so Rudi`s assumption is that he must be American.

"These guys are linked to WikiLeaks and they just post things as they come - it's probably American."

Rudi does not stop there, he goes on to say that Seclists.org and hackers are associated with Wikileaks. This is absolutely not true. MWEB CEO Rudi Jansen lied. Its as simple as that. Seclists.org and Insecure.org are in no ways associated with Wikileaks.org. Why the lie Rudi? Why the attempt to blacken Wikileaks name at such a sensitive time?

Whats also interesting about the NEWS24 article is the downplaying of how many accounts were actually compromised. According to NEWS24 there were several accounts compromised and I quote:

"Cape Town - ISP MWEB has been hacked and the details of several of their business clients have been posted online."
What we see here is MWEB and NEWS24 being dishonest and trying to downplay the event. Its pretty clear by visitng the Seclists.org site showing the hack that it was not several accounts that were hacked, but several hundred:

http://goo.gl/ELIx

Well for me personally. I wont be using or recommending MWEB again. The whole way the handled this was dishonest and deceitful.

To my readers. Be careful of the company you trust with your personal data and be sure to research the integrity of Internet providers in South Africa. For the majority of them the bottom line is more important than honest.

UPDATE: It looks like one of the compromised accounts belongs to the South African National Defense Force:

"mweb-bussol-pta-279 () busdsl mweb net kyztrnvb s4096 Joint Operational HQ / SANDF"