The Hacker News Logo
Subscribe to Newsletter

Hacker exposes 40,000 Credit Cards from Digital Playground

Hacker exposes 40,000 Credit Cards from Digital Playground

A new hacking group called The Consortium has hit the scene and their first take down is the porn site Digital Playground deface it and Mirror is available here. Everything, including credit card information, was stored in plain text. "The Consortium" claim to have broken into the servers of DigitalPlayground.com last weekend and stolen 72,000 usernames and passwords and 40,000 credit-card numbers.

In addition to the theft of credit card numbers, the hackers also claim that they made off with the personal information of 72,000 other users. This the second large hacking attack on a porn website in the last several months. Previously a site called YouPorn was attacked.

The Consortium, which claims affiliation to hacktivist group Anonymous, claims the Digital playground site was so riddled with security holes that it acted as a irresistable target. "We did not set out to destroy them but they made it too enticing to resist," the group said in a statement posted online. "So now our humble crew leave lulz and mayhem in our path."

All of the 100 user passwords given as examples were in plaintext, not encrypted as security best practices demand. Even worse, the hackers claim that all credit-card numbers and card security codes were as well, though large parts of the two numbers used as examples were blacked out.

Last month, a teenage hacker broke into Brazzers, the hardcore porn portal, before making off with hundreds of thousands of user login details. Brazzers admitted the breach but stressed that no credit card data had been exposed.

A message posted by the hackers read in part:
We are The Consortium, and we have something special for our first release.


You see for a while now we have had access to digitalplayground.com, one of the five biggest porn sites in the world.
But it doesn't need any introduction from us.


This company has security, that if we didn't know it was a real business, we would have thought to be a joke - a joke that we found much more amusing than they will.


These credit cards are all plaintext but we will not be releasing or using as we do this for the love of the game not for profit and these peoples only crime was wanting some porn. We cannot justify releasing these peoples credit card info, but remember it is DP that allowed this to happen, this could have been a different group. And perhaps they may have done far worse when given this information.

Hacker also list NAVY Military Emails accounts also, who are member of this Porn site:
nicholas.brosky@us.army.mil vegeta24
martin.pittsburke@cvw11.navy.mil qazwsx
shaun.x.adams@us.army.mil shang1911
john.mcmahan2@us.army.mil mc0095
wbelding@ddg80.navy.mil lester5720
jose.lopez16@us.army.mil sesoliz1013
Douglas.fowler1@us.army.mil Budgens.1
mhgochenour@navy.mil 101512hd
peter.wolff@us.army.mil Bohica69
justin.smith79@us.army.mil harley
elliscl@lpd19.navy.mil botigerbag3
jose.n.cruz@us.army.mil jose5673
Joe.reynolds2@us.army.mil fatboy47
galen.oestrike@us.army.mil Patton
jeremiah.hintz@us.army.mil scouts
derek.elsberry@us.army.mil ranger275
jacob.ball3@us.army.mil AManda1201
arturo.gonzalez6@us.army.mil armyretire1
scott.croop@us.army.mil vivitron
omoro.bryant@med.navy.mil 12211990
brad.patronick@us.army.mil darkn1ght
macrij@saipan.navy.mil 201171
badgerowc@anzio.navy.mil karledso
dtix@gimail.af.mil romad24
mark.law@us.army.mil dork6173
euthon.holley@navy.mil LIANALA
peter.lemay@navy.mil 9323
M_GREEN@SAR.MED.NAVY.MIL 817571
mmojica@ashland.navy.mil 10 22 98
awarnock@as39.navy.mil andrss
robert.whitelow@us.army.mil chitown
allen883@seabee.navy.mil allen
zhangk@gonzalez.navy.mil kai
thomas.edmunds.ctr@usmc.mil 98avalon
jason.r.fish@us.army.mil indycolts
nicolas.guerrero@mcguire.af.mil soccer
nicholas.sweetman@yokota.af.mil #1sTUNNA
luis.ramirez8@us.army.mil luis26
mark.r.jones1@us.army.mil jones2447
noah.western@us.army.mil 92104200
michael.green.gtmo.med.navy.mil a!s@d$123
robert.w.hubbard@us.army.mil 2229
jason.e.johns@us.army.mil dante025
244.andersson@duda.mil.se KASK1999Chris
golf05@gimail.af.mil 05golf05
daniel.cassidy2@us.army.mil superfly
matthew.houston2@us.army.mil 696969
matthew.shurtleff@us.army.mil forever1
randolph.wampler@us.army.mil Grumpy666
benjamin.sweitzer@lakenheath.af.mil zaq12wsx
mario.santiago1@us.army.mil yonugscrappy
roberto.peralta@us.army.mil iloveyou
brian.smith21@us.army.mil kate0522
Sean.schrader@us.army.mil 92984
michael.aaron.king@us.army.mil raider
Steven.Lemmer@vandenberg.af.mil lemmers
William.Griewahn@Ramstein.af.mil WillG85
aaron.long.ctr@tinker.af.mil @Toy0101
Jason.Eisenbarth@us.army.mil 903821
michael.w.mack@navy.mil 21972474
gary.depriest@us.army.mil bog9027
gavin.obrien@us.army.mil burton13
alton.d.whittington@us.army.mil dylan1
jgibbs@as39.navy.mil Father45
michael.dailey@us.army.mil redrum
matthew.welch1@us.army.mil welch
buenodel@kitty-hawk.navy.mil fuckyou
farleyj@ffg46.navy.mil saints
dan.j.anderson@us.army.mil 798106
andres.jimenez@usmc.mil HELLSTAR
brandon.pepper@us.army.mil Pepper08
martin.pittsburke@cvw11.navy.mil qazwsx
shaun.x.adams@us.army.mil shang1911
scott.croop@us.army.mil vivitron
jacob.ball3@us.army.mil AManda1201
nielf@opsc.gov.za tayron
143457@gsuimail.gov teagan
capereirac@dane.gov.co escorpin
maperez@conavi.gov.ve lalo
james.clarke@state.sa.gov.au farside
jolejnicak@duluthmn.gov solomon
jim.sinclair@records.nsw.gov.au Jungle56

Have something to say about this article? Comment below or share it with us on Facebook, Twitter or our LinkedIn Group.
SHARE
Comments
Latest Stories
Best Deals

Newsletter — Subscribe for Free

Join over 500,000 information security professionals — Get the best of our cyber security coverage delivered to your inbox every morning.