*** Welcome to piglix ***

NullCrew

NullCrew
NullCrew.png
NullCrew logo
Abbreviation NC
Motto "Probing the governments anus since 2012!"
Formation May 2012
Type Hacking.
Volunteers
5

NullCrew was a hacktivist group founded in 2012 that took responsibility for multiple high profile computer attacks against corporations, educational institutions, and government agencies. Its members were listed as: zer0pwn (Dominik Penner) & 0rb1t/rootcrysis (Timothy French). NullCrew was often compared to LulzSecurity, even though the group lasted twice as long. It disbanded after an ex-member with the alias Siph0n, was revealed to have been working as a confidential-informant for the FBI. These accusations were made by zer0pwn, allegedly, after going over the official court documents provided to his lawyer.

On July 13, 2012, the group assumed the World Health Organization and PBS releasing a pastebin post containing 591 plain-text usernames, and passwords; relating to the WHO attack, as far as the PBS attack goes, it was mostly database information, as well as 1,000 emails, and passwords.

On July 16, the group breached ASUS aka ASUSTeK Computer Inc. releasing a pastebin post, containing 23 administrator usernames, and hashed passwords.

The group targeted several universities in the United Kingdom including Cambridge in August 2012.

In September, the group claimed on its Twitter account to have taken control of eight servers run by entertainment corporation Sony. Also in September, the group responded to the arrest of a Pirate Bay co-founder in Cambodia by officials; the response was an attack against the Cambodia Government, leading to several governmental servers being pillaged.

On November 5, 2012; A renoun anonymous holiday known by a V for Vendetta phrase "Remember, Remember the fifth of November." Two of the groups core members: Null and Timoxeline announced a successful attack against the U.K. Ministry Of Defense; the attack included over 3,000 Usernames, Email addresses, and passwords that appeared to belong to the U.K. Ministry Of Defense. The two claimed that the attack was allowed due to a simple mistake by the web-developers and the attack was indeed SQL Injection.

The group released the first in what is supposed to be a series of mini e-zines under the operation of "FuckTheSystem" on September 28, 2012. The first mini e-zine contained the column and table structure to the U. S. Department of State, as well as the administrator and webmaster password in plain-text; it also contained exposure of vulnerabilities on the Foxconn website.


...
Wikipedia

...