Hacktivism

Anonymous hacked the controversial, far-right web host Epik

Anonymous claims to have hacked the controversial web hosting provider Epik, known for allowing far-right, neo-Nazi, and other extremist content.

Anonymous hacktivist collective claims has claimed to have hacked the controversial web hosting provided Epik and stolen its data, including information of the clients of the company, as part of an operation codenamed EPIKFAIL.

The hosting provided is known for allowing far-right and neo-Nazi groups to publish extremist content. The hacktivists have stolen 180GB of data of user, registration, forwarding and other information and leaked it on the DDoSecrets non-profit whistleblower site.

According to the hackers, stolen data includes:

  • Domain purchases
  • Domain transfers
  • WHOIS history
  • DNS changes
  • Email forwards, catch-alls, etc.
  • Payment history
  • Account credentials
  • Over 500,000 private keys
  • An employee’s mailbox
  • Git repositories
  • /home/ and /root/ directories a core system

Anonymous group pointed out that the above data can allow tracing the “actual ownership and management of the fascist side of the internet.”

“180 gigabytes of user, registration, forwarding and other information behind the “privacy” web hosting and registrar service Epik, known for hosting fascist, white supremacist and other right-wing content as well as harassment and doxing websites” reads the announcement on DDoSecrets.

The leak site includes both torrent and Magnet links.

“Due to its size, it’s incompatible with most torrent clients and many users will have difficulty downloading the data. When we’re able, we’ll release a more accessible version of the data.” continues the announcement.

The list of clients of the hosting provider includes the conservative social media platform Parler, pro-Trump The Donald site, Gab, anti-abortion snitch website, the Texas GOP website, and BitChute video hosting service known for hosting accommodating far-right and conspiracy content.

The news of the data breach was first reported by the independent journalist Steven Monacelli.

An Epik sympathizer doxxed Monacelli after he reported the data breach:

Anonymous announced the hack with a message published on 4Chan, below is the image of the press release published by the HackRead website.

“On September 13, 2021, a group of kids calling themselves ‘Anonymous’, whom we’ve never heard of, said they manage[d] to get a hold of, well, honestly, all our data, and then released it,” reads the Anonymous’ message published on the Epik’s knowledge base. “They claim it included all the user data. All of it. All usernames, passwords, e-mails, support queries, breaching all anonymization service[s] we have. Of course it’s not true. We’re not so stupid we’d allow that to happen.”

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Anonymous)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Operation RapTor led to the arrest of 270 dark web vendors and buyers

Law enforcement operation codenamed 'Operation RapTor' led to the arrest of 270 dark web vendors…

4 hours ago

Chinese threat actors exploited Trimble Cityworks flaw to breach U.S. local government networks

A Chinese threat actor, tracked as UAT-6382, exploited a patched Trimble Cityworks flaw to deploy…

7 hours ago

U.S. CISA adds a Samsung MagicINFO 9 Server flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Samsung MagicINFO 9 Server vulnerability to its…

15 hours ago

New Signal update stops Windows from capturing user chats

Signal implements new screen security on Windows 11, blocking screenshots by default to protect user…

23 hours ago

Law enforcement dismantled the infrastructure behind Lumma Stealer MaaS

Microsoft found 394,000 Windows systems talking to Lumma stealer controllers, a victim pool that included…

1 day ago

Russia-linked APT28 targets western logistics entities and technology firms

CISA warns Russia-linked group APT28 is targeting Western logistics and tech firms aiding Ukraine, posing…

1 day ago