NoGoolag
4.54K subscribers
13.2K photos
6.93K videos
587 files
14.1K links
Download Telegram
An Infamous Neo-Nazi Forum Just Got Doxxed

A cache of data exposes the logins, emails, and IP addresses of users on IronMarch, a defunct neo-Nazi
forum considered the birthplace of several militant organizations.

It’s no secret that neo-Nazis freely post anonymously all over the internet, every single day. But a recent leak shows that white nationalists online can’t always protect their identities.

The metadata of a now-defunct neo-Nazi message board that is considered the birthplace of several militant organizations—among them the U.S.-based terror group Atomwaffen Division—was dumped onto the internet by what appears to be anti-fascist activists.

The site, IronMarch, is widely associated with the rise of the new wave of white supremacist accelerationst groups advocating for armed insurgency against society. The site ran from 2011 to 2017 and garnered more than 150,000 posts while active. The dump of its inner workings includes the login names of its former members and their associated emails and IP addresses.

Although Motherboard could not verify all the contents of the dump, early record searches match names and details of white nationalist militants tracked by Motherboard over the course of a two-year investigation into neo-Nazi terrorism. The dump also matched internal IronMarch data that Motherboard already accessed.

The identity of whoever originally obtained the data isn’t known, but the dump was uploaded to the Internet Archive by a user named “antifa-data” on November 6.

👉🏼 Read more:
https://www.vice.com/en_us/article/a359q8/an-infamous-neo-nazi-forum-just-got-doxxed

💡 https://www.bellingcat.com/resources/how-tos/2019/11/06/massive-white-supremacist-message-board-leak-how-to-access-and-interpret-the-data/

💾 Leaked Data (Torrent):
https://www.bthub.me/hash/1d0554862068bfaba9bd2fc6f75cb69fa420c834

#doxxed #nazi #forum #IronMarch #AtomwaffenDivision #leak #breach
📡@cRyPtHoN_INFOSEC_DE
📡@cRyPtHoN_INFOSEC_EN
📡@cRyPtHoN_INFOSEC_ES
Iranian hackers are selling access to compromised companies on an underground forum

The Iranian hacker group who's been attacking corporate VPNs for months is now trying to monetize some of the hacked systems by selling access to some networks to other hackers.

One of Iran's state-sponsored hacking groups has been spotted selling access to compromised corporate networks on an underground hacking forum, cyber-security firm Crowdstrike said in a report today.

The company identified the group using the codename Pioneer Kitten, which is an alternative designation for the group, also known as Fox Kitten or Parisite.

https://www.zdnet.com/article/iranian-hackers-are-selling-access-to-compromised-companies-on-an-underground-forum/

#Iran #hackers #underground #forum