NSFW Anon Archived Nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation and others are dumped online (washingtonpost.com)
submitted ago by 3780728?
Posted by: 3780728?
Posting time: 8 months ago on
Last edit time: never edited.
Archived on: 7/21/2020 10:00:00 AM
Views: 61
SCP: 3
5 upvotes, 2 downvotes (71% upvoted it)
~91 user(s) here now
Subverse anonymized: usernames are hidden and votes don't count.
NSFW: Yes
Authorized: No
Anon: Yes
Private: No
Type: Default
NSFW Anon Archived Nearly 25,000 email addresses and passwords allegedly from NIH, WHO, Gates Foundation and others are dumped online (washingtonpost.com)
submitted ago by 3780728?
Sort: Top
[–] 23508491? 0 points 1 point 1 point (+1|-0) ago
can't read the article....(can't access) if anyone wants to post it here, that would be great.
[–] 23508527? [S] 0 points 1 point 1 point (+1|-0) ago
Unknown activists have posted nearly 25,000 email addresses and passwords allegedly belonging to the National Institutes of Health, the World Health Organization, the Gates Foundation and other groups working to combat the coronavirus pandemic, according to the SITE Intelligence Group, which monitors online extremism and terrorist groups.
While SITE was unable to verify whether the email addresses and passwords were authentic, the group said the information was released Sunday and Monday and almost immediately used to foment attempts at hacking and harassment by far-right extremists. An Australian cybersecurity expert, Robert Potter, said he was able to verify that the WHO email addresses and passwords were real.
The lists, whose origins are unclear, appear to have first been posted to 4chan, a message board notorious for its hateful and extreme political commentary, and later to Pastebin, a text storage site, to Twitter and to far-right extremist channels on Telegram, a messaging app.
“Neo-Nazis and white supremacists capitalized on the lists and published them aggressively across their venues,” said Rita Katz, SITE’s executive director. “Using the data, far-right extremists were calling for a harassment campaign while sharing conspiracy theories about the coronavirus pandemic. The distribution of these alleged email credentials were just another part of a months-long initiative across the far right to weaponize the covid-19 pandemic.”
The report by SITE, based in Bethesda, Md., said the largest group of alleged emails and passwords was from the NIH, with 9,938 found on lists posted online. The Centers for Disease Control and Prevention had the second-highest number, with 6,857. The World Bank had 5,120. The list of WHO addresses and passwords totaled 2,732.
Smaller numbers of entries were listed for the Gates Foundation, a private philanthropic group whose co-founder, Microsoft co-founder Bill Gates, last week announced $150 million in new funding to combat the pandemic. Also targeted was the Wuhan Institute of Virology, a Chinese research center in the city where the pandemic began that has been accused of a role in triggering the outbreak.
Sign up for our Coronavirus Updates newsletter to track the outbreak. All stories linked in the newsletter are free to access.
No, Bill Gates did not engineer the covid-19 pandemic — and other lessons on fake news
The NIH, CDC, WHO and World Bank did not immediately reply to requests for comment Tuesday evening. The Gates Foundation said in a statement, “We are monitoring the situation in line with our data security practices. We don’t currently have an indication of a data breach at the foundation.”
The FBI declined to comment.
Twitter spokeswoman Katie Rosborough said, “We’re aware of this account activity and are taking widespread enforcement action under our rules, specifically our policy on private information. We’re also taking bulk removal action on the URL that links to the site in question.”
Potter, chief executive of Australian company Internet 2.0, said he was able to gain access into the WHO computer systems using email addresses and passwords posted on the Internet. The WHO has come under heavy criticism, including from President Trump, who suspended funding to it, for its response to the novel coronavirus and has been accused of being too deferential to China.
The World Health Organization — under attack by Trump — was targeted by conservatives in 1948, too
“Their password security is appalling,” Potter said of the WHO. “Forty-eight people have ‘password’ as their password.” Others, he said, had used their own first names or “changeme.”
Potter said the alleged email addresses and passwords may have been purchased from vendors on the dark Web, a portion of the Internet that is not indexed by most search engines and where hacked information often is posted for sale. He said the WHO credentials appear to have come from a hack in 2016.
Katz, of SITE, said that while material from old hacks does appear on the dark Web occasionally, “we have not yet found any rock-solid proof of that for this specific case.”
References to the hacked information already are being deployed online to fuel disinformation, including linking HIV, the virus that causes AIDS, to the coronavirus.
Among the most prominent Telegram venues to share the information was the neo-Nazi channel “Terrorwave Refined,” a prominent recruiting and support channel for neo-Nazi groups such as Azov Battalion, the Base and Nordic Resistance Movement. In the past four months, the number of users subscribed to Terrorwave Refined has increased by 30 percent, with the channel now hosting over 5,300 followers.
Terrorwave Refined shared tweets and a thread on 9chan, another message board popular with extremists, containing the addresses and passwords. Terrorwave Refined posted a meme that implied that information seized through the email addresses and passwords “confirmed that SARS-Co-V-2 was in fact artificially spliced with HIV,” referring to the scientific name for the coronavirus.
A Twitter post with links to the data said, “Anons know what to do...make this go viral” — a likely reference to anonymous followers.
[–] 23508665? 0 points 1 point 1 point (+1|-0) ago
thank you. much appreciated!
[–] 23508419? 0 points 1 point 1 point (+1|-0) ago
http://archive.vn/hy4Ud
[–] 23508341? 0 points 1 point 1 point (+1|-0) ago
Terrorwave Refined shared tweets and a thread on 9chan, another message board popular with extremists, containing the addresses and passwords.
[–] 23508214? 0 points 1 point 1 point (+1|-0) ago
Honeypot.
[–] 23508311? [S] ago
In what way?
A list can be analyzed for social relationships.
Passwords can be analyzed for security.
There is northeast associated with having a text file.
How could it be a honeypot? They are on archive sites.
[–] 23508904? ago (edited ago)
It was a set-up to get QAnon in trouble. I believe Freddie Brennan might have been behind it. The email lists are one thing (may have been given to the 'hacker'), but to use them to try to dig up data at those sites is another. Someone is trying to get others to do that, or it would have already been done and the data would be available.
What is 'northeast'???
[–] 23508464? ago
Those passwords are fake. I cannot believe so many people fell for it.
[–] 23508479? [S] ago
The passwords worked. Did you read the article?
[–] 23508543? ago
Have seen enough of it being pushed on a number of sites. Believe what you will, but it does not look legit. I hope people are not taking the bait, especially those who do not know what they are doing.
[–] 23508388? 1 point 0 points 1 point (+1|-1) ago
this was a trap and q researchers fell for it. no way this info accidental leaked.
[–] 23508424? 1 point 0 points 1 point (+1|-1) ago
I doubt that. Prove it.
[–] 23508447? 0 points 2 points 2 points (+2|-0) ago
the incredulity of three separate deep state gobvt agencies all being hacked is a major red flag. all at the same time. ummmm no.
[–] 23508456? [S] 1 point -1 points 0 points (+0|-1) ago
Did you even read the article?
[–] 23509420? ago
yes. the article is blaming Q without directly saying Q used the info to attack the agencies.