• Home
  • 23 Disclosures
    • 2012 Feb. 3 - Nov. 5
      • unclesam.de Nov. 5, 2012
      • Punto.pe Oct. 20, 2012
      • Apple Sep. 4, 2012
      • Yahoo! Jul. 12, 2012
      • LinkedIn Jun. 6, 2012
      • militarysingles.com Mar. 25, 2012
      • Digital Playground Mar. 12, 2012
      • YouPorn Feb. 21, 2012
      • Bkav Feb. 3, 2012
    • 2011 Feb. 6 - Dec. 25
      • STRATFOR Dec. 25, 2011
      • hemmelig.com Dec. 21, 2011
      • CSDN Dec. 21, 2011
      • clearusa.org Dec. 12, 2011
      • napsu.fi Dec. 3, 2011
      • helistin.fi Nov. 28, 2011
      • LulzSleigh Nov. 12, 2011
      • OhMedia Nov. 7, 2011
      • Booz Allen Hamilton Jul. 11, 2011
      • pepper.nl Jul. 3, 2011
      • LulzSec (final release) Jun. 26, 2011
      • LulzSec Jun. 16, 2011
      • Sony Pictures Jun. 3, 2011
      • rootkit.com Feb. 6, 2011
    • Subscribe to our Disclosure Alert
  • reusable.py
  • passwords.txt (19.2MB)
  • UNIQPASS
STRATFOR
cleartext passwords

On December 25, 2011, the Anonymous group hacked into a private intelligence agency, Strategic Forecasting Inc. or STRATFOR, based in Austin, Texas. The attack began with the release of STRATFOR's client list announced at https://twitter.com/#!/AnonymousIRC/status/150679351589998593 followed by release of accounts in batches believed to belong to STRATFOR's customers. The release announced in another Twitter post at https://twitter.com/#!/AnonymousIRC/status/150985258999885824 includes emails, passwords (hashed with MD5), home/office addresses and credit card information (full 16-digit number, expiry date and CVV number). The table below is the list of the leaked accounts with the passwords removed.



STRATFOR has brought down their site following the attack but kept their members posted on the status of the attack via their Facebook page.


UPDATE (February 27, 2012): WikiLeaks announced today the release of "The Global Intelligence Files" which will make public the dump of STRATFOR's 5 million emails. Browse, search and read the emails at "The Global Intelligence Files" page.


UPDATE (January 2, 2012): We have processed all 860,000 STRATFOR's registered users and added them into the table below. These users do not have their credit card information leaked. The earlier accounts with credit card information leaked are now tagged with cc in the table below.


UPDATE (December 30, 2011): The Anonymous group has just released the remaining accounts making the total of leaked STRATFOR's accounts with credit card information to a total of approx. 75,000. The table below has been updated to include these accounts. Additionally, login information for approx. 860,000 STRATFOR's registered users have been leaked as well but they don't include credit card information; we may update the table below to include these users later.


This disclosure was mentioned in PCWorld, Forbes, CNN, MSNBC, FOX News and TheBlaze.


What should you do?
Use the search box below to find out if your email is in the list. If yes, you are advised to change your password immediately if it is still in use elsewhere. For your privacy, do not enter your complete email in the search box. Try using the first part of your email instead, e.g. example instead of example@domain.com.

If you wish to have your entry removed from the list below, please send an empty email to disclosure@dazzlepod.com with subject "stratfor removal request". The removal is done automatically within 24 hours if you use the same email as the one appeared in the list. This page may be cached for up to 24 hours.

Search
e.g. example@domain.com, example
Page 1 of 4281 next (856090 accounts)
ID Email / Username Password
1 cc mweible@weiblecahillcom ***
2 cc gpsnodgrass@coxnet ***
3 cc bertfilm@mecom ***
4 cc gchiappe@pacbellnet ***
5 cc gwmson@austinrrcom ***
6 cc sezammel@gmailcom ***
7 cc robburton@bwpglobalcom ***
8 cc rodvic66@yahoocouk ***
9 cc hootervl@infinet ***
10 cc mwalkr@ktccom ***
11 cc michaelhatton@maccom ***
12 cc michaelhatton@mecom ***
13 cc jackwitkin@comcastnet ***
14 cc pagan@comlinecom ***
15 cc tgkoch@webde ***
16 cc lauren@thinkgardensnet ***
17 cc faldumande@netspacenetau ***
18 cc pilgrimpatriot@aolcom ***
19 cc tkerbs@iatrecom ***
20 cc bwrisley@gmailcom ***
21 cc bww@packetsinkcom ***
22 cc gwoods3@msncom ***
23 cc andrej_duma@hotmailcom ***
24 cc frankbernard@rbccom ***
25 cc marcusstern@copleydccom ***
26 cc mzelnick@thezelnickgroupcom ***
27 cc qiworks811@gmailcom ***
28 cc ad@delucatxcom ***
29 cc darrenhorvath@gmailcom ***
30 cc Fredvmc@earthlinknet ***
31 cc jenwright@apollosecuritycom ***
32 cc Camaryth@MeCom ***
33 cc JohnAnderson@bkkpartnerscom ***
34 cc jacquie@cameldalecom ***
35 cc rayfitzgerald@2wglobalcom ***
36 cc bobhaferl-jr@verizonwirelesscom ***
37 cc daniel137@centurytelnet ***
38 cc aacosta@barksdalecom ***
39 cc mbruns@harthosporg ***
40 cc morsonpeter@gmailcom ***
41 cc growingoldoffensively@gmailcom ***
42 cc rads4cure@aolcom ***
43 cc rstromstad@ducksorg ***
44 cc damcclusky@hotmailcom ***
45 cc JRJAMESF@CSCOM ***
46 cc lpoleski@gmailcom ***
47 cc ron_cook@tamkocom ***
48 cc strachanjustin@gmailcom ***
49 cc dmcierman@hotmailcom ***
50 cc lonnysmith@agroliquidcom ***
51 cc jmalone@21technologiescom ***
52 cc sudhirseth@yahoocom ***
53 cc dougdouggarrett@gmailcom ***
54 cc trinen@mindspringcom ***
55 cc j2blkazn@yahoocom ***
56 cc jliburt@msncom ***
57 cc odajima-hisashi@mitsubishi-seccojp ***
58 cc xian893@coxnet ***
59 cc ifokuo@bothoadvisorygroupcom ***
60 cc anixon6@coxnet ***
61 cc tb4736@hotmailcom ***
62 cc rthornton21@verizonnet
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.