FRESH BREACH ***FULL DATA DUMP*** RAPTOR SUPPLIES (100M+) MIL/GOV/CIV CONTRACTORS
by FulcrumSec - 16-12-25, 05:51 AM
(16-12-25, 05:51 AM)FulcrumSec Wrote: UPDATE:  Our patience has run out. Here's the full leaked data set:
 


[b]We'll keep adding to this post on a daily basis leading up until the full leak.


---

More dataset stats (and we are still finding more good stuff daily):

  Total Size: 450GB+ (JSON/SQL/CSV)

[/b]
  •   Identities Exposed: 298,425 Unique email addresses + associated data
  •   2,811 Military/Government contacts (20+ countries) + associated data
  •   Deal Records: 428,531 with complete procurement history
  •   Financial Records: Transaction data, payment methods, billing addresses
  •   Google Ads: Full advertising strategy, transaction history, campaign performance
  •   Zoho CRM: MILLIONS of CASES, ORDERS, REFUNDS, CONTACTS, etc.
  •   Outlook email backup: 68 MILLION email messages, complete conversations with customers, issues with equipment (INCLUDING MILITARY ORDERS), troubleshooting, customer PASSPORTS, customer IBANs + OTHER BANKING data.
  •   Gmail: 13.3 MILLION emails, also with the above data and attachments
  •   Order Tracking: Granular order tracking through UPS, Ship24, FedEx (their API key is still active, incredibly) for MILLIONS of order (including to military bases)

As you can see, Raptor's negligence exposed active duty military personnel, diplomatic corps, and critical defense supply chains.

  •   US Air Force: More than 100 Air Force emails, military base addresses, procurement, supply line, etc.
  •   US Navy: Logistics data for USS Santa Barbara (LCS-32) (Sourivanh.Sakdarak@lcs32.navy.mil) + base shipping data, supply line, phone numbers, ip addresses, invoices
  •   UK Ministry of Defence: Procurement contacts (Anthony.Furnival235@mod.gov.uk).
  •   Australian Defence Force: Invoices for DSTG and RAAF Base Amberley, ip addresses, addresses.
  •   NATO: Confirmed orders linked to natopart.com.
  •   US Dept. of State: 50+ email addresses, ips, addresses, payment info, at least one PASSPORT SCAN.
As well as civilian gov agencies in those countries + Singapore and elsewhere.

All will be posted here and on our onion site if Raptor doesn't pay up within a week.

[b]To Raptor Supplies: Do the right thing for your customers and NEGOTIATE. Otherwise you'll be forcing our hand.


Currently, we're using reappropriated SMTP accounts to notify their clients of the breach and give them a chance to remove their data from the final leak package IF they send us a screenshot of them contacting Raptor to tell them to PAY UP and/or notify regulators in their country of Raptor's extraordinary incompetence. 

We also are deleting the data of any concerned gov/military/NGO or other such org even if they do not send a screenshot, because the only mistake they made was trusting Raptor, and frankly, we might care more about protecting their data than Raptor does.

For those who are not gov/mil and don't contact Raptor on our behalf, we are going to continue to spam them, again, and again, and again, because we have more than a THOUSAND SendGrid, MailChimp, Brevo, and other mass mailing accounts in our armoury (thanks React2Shell!). And of course, we will eventually leak all of their company's data if Raptor does not comply.

Here's a sample of the gov/mil accounts whose communications, payment data, ip and physical addresses Raptor decided to leave loose on the internet. Just a tiny sample of the NEARLY 3K OF THEM THEY EXPOSED:

claudette.fricot@defence.gov.au
claudia.lawrence@health.nsw.gov.au
clayton.petrie@us.af.mil
clayton.whitehead@infrastructure.gov.au
clement.groepies@capetown.gov.za
cliff.brown@blackburn.gov.uk
clive.williams160@mod.gov.uk
clive.williams@deca.mod.uk
clive.zhu@transport.nsw.gov.au
coco_chew@bca.gov.sg
colin.esnouf@sa.gov.au
con.skrepetos@health.tas.gov.au
connor.marshall1@defence.gov.au
connor.moran@infrastructure.gov.au
connor@deeca.vic.gov.au
connornicholls@merseyfire.gov.uk
conor.p.grace.civ@us.navy.mil
conrad.ellerby@esb5.navy.mil
cooper.woods1@fleet.defence.gov.au
cortez.jenkins@us.af.mil
council@charlessturt.sa.gov.au
cowl1ric@police.nsw.gov.au
cqiuping@dsta.gov.sg
craig.wintle@ga.gov.au
cridenou@capecoral.gov
critchlj@ansto.gov.au
crna_code10b_arp@us.navy.mil
croydon.sds@education.vic.gov.au
crystal.cabrera3.mil@us.navy.mil
csvspo.procurement@defence.gov.au
cumulus_admin@psd.gov.sg
curtis.dean422@d101o101.mnd.r.mil.uk
cwaldron@mail.dstl.gov.uk
cynthia.morton@sbrc.qld.gov.au
cynthia.wernick.civ@army.mil
cyril.viale@intradef.gouv.fr
da-gdansk@piorin.gov.pl
dale.lapham@fire.tas.gov.au
dale.wilson.5@us.af.mil
dallas.roderick1@defence.gov.au
dalton.barath@forces.gc.ca
damani.toudle@durhamnc.gov
damar.k.green.civ@us.navy

Stay tuned for the data leaks from the other 14 companies (and growing!) listed in our index of shame:


https://fulcrumsec.net/shame/

Their data too will be posted if they refuse to do the right thing and safeguard their users' data -- and their own.
[/b]
thanks
Reply
thanks
Reply
Thank you for this
Reply


Forum Jump:


 Users browsing this thread: 1 Guest(s)