UN agency server hacked

UN agency server hacked

Summary: Hacker group Teampoison breaks into "old" United Nations server and posts e-mail and login details belonging to the UN Development Programme's team members to protest against organization, report notes.

SHARE:
0

A group of hackers named Teampoison breached one of the United Nations' (UN) servers and posted more than 100 e-mail addresses and login details to protest against the organization's behavior and called it a "fraud", according to a report.

The British news agency BBC reported on Tuesday that many of the e-mail accounts listed online following the hack appear to belong to members of the UN Development Programme (UNDP), while others appear to belong to members of the Organization for Economic Co-operation and Development (OECD), the World Health Organization (WHO) and the U.K's Office for National Statistics, it added.

A spokesperson for the UNDP, Sausan Ghosheh, told BBC that the UN believed "an old server which contains old data" had been targeted.

"The UNDP found [the] compromised server and took it offline. The server goes back to 2007. There are no active passwords listed for those accounts. Please note that UNDP.org was not compromised," she said.

Security company Sophos noted in the report that the Teampoison hacktivist group had previously attacked Research In Motion's Web site in the wake of the London riots and published private information about former U.K. prime minister Tony Blair.

Topics: Hardware, Security, Servers

Kevin Kwang

About Kevin Kwang

A Singapore-based freelance IT writer, Kevin made the move from custom publishing focusing on travel and lifestyle to the ever-changing, jargon-filled world of IT and biz tech reporting, and considered this somewhat a leap of faith. Since then, he has covered a myriad of beats including security, mobile communications, and cloud computing.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

0 comments
Log in or register to start the discussion