Past week, hacking group Nameless claimed to have stolen and leaked facts held by Epik, a web page hosting organization well-liked with far-correct organizations like the Proud Boys.
The reams of data, amounting to 150 gigabytes, include info about those who tried to overturn the 2020 presidential election. Epik has historically offered web hosting expert services to a number of conspiracy theorists and conservative media networks.
Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
On Epik’s clientele list have been several web pages banned from other platforms for violating dislike speech and misinformation policies. These consist of those people affiliated with the Very pleased Boys, 8chan, Parler, and QAnon conspiracy teams.
“On September 15, we verified that selected client-account information for our domain-relevant units was accessed and downloaded by unauthorized 3rd events,” tweeted the firm, which calls itself the “Swiss Bank of Domains” on its web site.
pic.twitter.com/ljBqeCqZyb
— Epik.com (@EpikDotCom) September 18, 2021
In a statement, Nameless explained they’ve stolen “a decade’s worth” of corporation info, like passwords, interior emails and clients’ household addresses and phone numbers.
The breach undermines Epik’s longstanding pledge that consumer knowledge would keep on being anonymous irrespective of sights prospects could possibly share on the web.
Megan Squire, a professor at Elon University who research suitable-wing extremism, told The Washington Post that: “It’s enormous. It may be the most significant domain-model leak I’ve found and, as an extremism researcher, it’s absolutely the most exciting.
“It’s an humiliation of riches — worry on the embarrassment.”
Some pieces of this short article are sourced from:
www.infosecurity-magazine.com