Friday, April 28, 2017
Home / Security / Breaches / Pentagon.mil Breached with a Partial data Dump

Pentagon.mil Breached with a Partial data Dump

A hacker that goes by the name “~!White!~” has contacted us with a breach on a Pentagon.mil sub domain,  the sub domain was not disclosed.

The individual did provide us with a partial data dump that was posted to Pastee.org with a expiration date and all the sensitve data removed.  You can view a snippet of the dump below:

Pentagon.Mil
 available databases [79]:
[*] AppianTracking
[*] ArmyPostureStatement
[*] btac
[*] caad
[*] CBMa
[*] ChaplainCenter
[*] hydadatasource
[*] master
[*] sb_veodo
[*] schedz
[*] acsim_ca
[*] AF_CMRA
[*] AF_CMRE_Audit
[*] ANC
[*] ArmySuggestionProgram
[*] ARTSDOL_IDB
[*] AYFBH
[*] BA
[*] BLxM
[*] CMRA
[*] CMRA_Audit
[*] CMRA_Hist
[*] CMRA_Hist_Audit
[*] CMRP
[*] coredb
[*] CTOF
[*] CYT_Training
[*] dpo
[*] DSLDB
[*] eDARTS_IDB
[*] edartsanc
[*] eflow
[*] EFUNDS2
[*] Emanager
[*] HumanResources
[*] INFOSEC
[*] ITQ13E
[*] IWIAS
[*] IWIAS_Symposium
[*] IWIAS_Training
[*] KIOSK
[*] logistics
[*] LSWpropturnin
[*] model
[*] msdb
[*] OAA911Memorial
[*] OAA911Memorial_Public
[*] OCLLfeedback
[*] OGCEthicsTraining
[*] Opentraining
[*] OPSEC
[*] pam2530_data
[*] pentlib
[*] phone
[*] PTI
[*] RBuilderOO_p2011
[*] RbuilderOPTrain_P2011
[*] ROCQ
[*] routeranc
[*] routerdb
[*] Sigar
[*] SLD_History
[*] SMY_NP
[*] surveys
[*] tempdb
[*] TLD_CMO
[*] tmsDB
[*] TnA
[*] TrackingSysFeedBack
[*] TRM_Utilities
[*] TRMIS
[*] TRMIS_AC
[*] TRMIS_AR
[*] TRMIS_FcMS
[*] TRMIS_ITRM
[*] TRMIS_NG
[*] TRMIS_Ref
[*] Ucr
[*] vpas
 Database: abc
[3 tables]
+---------------------------------+
| dbo.Q |
| dbo.[\t#\x1e] |
| dbo.[~\x7f?5\x05E\tA\x06))u\x0b]|
+---------------------------------+
 Database: ChaplainCenter
[1 table]
+-------------+
| dbo.[\x03!] |
+-------------+
 Database: dpo
[5 tables]
+----------------------+
| dbo.Address_T |
| dbo.Mail_Manager_T |
| dbo.Service_T |
| dbo.Maiurqty_T |
| dbo.dtproperties |
+----------------------+

The hacker also claimed to have vulnerabilities discovered in the following sites, “Noaa.gov,Doe.gov,Army.mil,Dla.mil,Osd.mil,Pentagon.mil, and Usmc.mil”.  He then went on to say, “The vulnerability was already reported, but since they didn’t fix it i decided to show them what could happen if they don’t secure their site. All sensitive information was removed and or not included in the dump. I sent them another email telling them what could happen if someone else got their hands on the vulnerability.”

About FastFlux

Owner of ZeroSecurity, interested in programming, malware analysis and penetration testing. If you would like to write for the ZeroSecurity team, please use the contact form above.

Check Also

Amazon hacked – hacker leaks 80,000 login credentials

A hacker going by the name 0x2Taylor has said to have breached the servers of …

  • Everyone needs to take note of this one… Think information is safe? I didnt here about this on CNN?