NullCrew

NullCrew

Updated Aug 04, 2015 at 01:17AM EDT by Brad.

Added Mar 29, 2013 at 05:50PM EDT by amanda b..

PROTIP: Press 'i' to view the image gallery, 'v' to view the video gallery, or 'r' to view a random entry.

This submission is currently being researched & evaluated!

You can help confirm this entry by contributing facts, media, and other evidence of notability and mutation.

About

NullCrew is a hacktivist group best known for working against large international corporations, educational institutions and government agencies that it deems corrupt. Lead by a person using the pseudonym Null, the group consists of the hackers known as 0rbit, Doc, 3cho, Siph0n, Nop and crazyboris.

Online History

NullCrew's first attack took place on July 12th, 2012, when they hacked into the World Health Organization's website[15], leaking 568 user credentials from their servers in protest of poor global healthcare systems. The following day, they also released passwords from PBS.[13] On the 16th, NullCrew broke in to the technology equipment company ASUS's online store[14], leaking the usernames and passwords of people who had shopped with them. In the following days, NullCrew also hacked into a South African ISP directory[16], Yale University[17] and NetCom[18], leaking user information from each site. On August 5th, the group launched their official Twitter account[1], making their first tweet later that month to announce a hack on Memorex Electronics.




In late August 2012, the group aligned itself with #OpFreeAssange, an Anonymous-lead campaign in support of Wikileaks founder Julian Assange, and targeted Cambridge University, releasing dozens of login information of professors and administrators.[12] Weeks later, NullCrew took on the several websites belonging to the Cambodian government[10] following the arrest of The Pirate Bay's co-founder in that country. The following month, NullCrew claimed that they had control of eight of Sony's servers[11], releasing more than 400 names and e-mail addresses.


600 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 600 9600 9600 %00 9600 9600 OfficialNull @OfficialNull SONY Hacked: pastebin.com/GKgB6aT @YourAnonNews @BreakTheSec @TheHackersNews @AnonOpsSweden @AnonHackNews @Cyber_War_News @TruthlzSexy Expand %00 % 9600 % %00 % %00 % %00 % %00 % %00 % %00 % %00 % %00 % 3h ULINCREW し.. %00 % %00 % %00 % %00 % %00 % %00 % Orbit @0rbit g1rl sony were coming for you. 3 #NullCrew 5h %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 %00 9600 9600 Retweeted by OfficialNull Expand

On March 6th, 2013, the group hacked in to Time Warner Cable's customer service website, defacing it with the former Gorilla Munch cereal mascot associated with the meme That Really Rustled My Jimmies.[2] They announced on Twitter that the hack was in protest of their use of the Copyrights Alert System[19] launched the previous month to punish subscribers who acquire illegal content. Though the defacement only lasted several hours, the hack exposed the fact that one of Time Warner's administrator passwords was set to the default "change me."


software\BupportsoftVconstantsVclobal\ SDC DBRPASSWORD SDC DBR SERVER Chat Archive _Prd chat Repo Prd CHATPSOLVB02,2433 Software\SupportSoft\Constants VGlobal Software\SupportSoft Constants\Globall SoftwareSupportSoft\constants\Globall Chat Reporting Prd Chat$35211 SoftwareSupportSoft\constants\Global\ SDC DB PASSWORD software\BupportsoftConstantsVlobal\

Search Interest

External References

Recent Videos

There are no videos currently available.

Recent Images 1 total


Top Comments


+ Add a Comment

Comments (5)


Display Comments

Add a Comment


'lo! You must login or signup first!