Five Star Movement, new hacker attack on Rousseau platform: online some donor names

| | ,

  1. Home
  2. /
  3. Blog
  4. /
  5. Magazine
  6. /
  7. Latest Italian News
  8. /
  9. Five Star Movement, new...

Last Updated on 2021/11/24

The author is once again Rogue0, the hacker who last year has attacked the operating system of the Cinquestelle party.

New hacker attack on the Rousseau platform. Rogue0, the hacker who last year breached the operating system of the Five Star Movement, is back in action, sharing on his Twitter profile, a few hours ago, two links leading to the site Privatebin.net, where the data related to the M5S platform database have been published.

What is the Rousseau platform?

The Rousseau platform is an application reachable on the web where the registered users of M5S can discuss, approve or reject legislative proposals (submitted then in the Parliament by the M5S group).

The platform is controlled by Casaleggio Associati, an internet and publishing company that advises on network strategies, and editor of Beppe Grillo’s blog. Casaleggio Associati has been founded by Gianroberto Casaleggio, co-founder, with Beppe Grillo, of the Five Star Movement. The company is now lead by his son Davide.

One of the two links would refer to a list of donations made last July with names, surnames, amounts, and emails from unencrypted donors. The other link shared by Rogue0 would lead to a list of recent tables in the Rousseau database.

According to Marco Canestrari, blogger and former employee of ‘Casaleggio Associati’,the attack is problematic if it would be determined that the system was not updated, as they declared some time ago answering to the Data Protection Supervisor requests.

In another tweet, the hacker publishes what according to the debunker and computer expert David Puente could be “the probable username of the database administrator in possession of the blackhat”.

“If these data are confirmed, it will not be good news for the platform’s managers, in addition to having to review the security of the entire structure, they will have to communicate to the Data Protection Supervisor and the users involved on what happened”, writes Puente on his blog.

The Data Protection Supervisor informs that they have initiated the first checks to “verify whether the data breach was determined by the same causes found in the past, already subject to a provision of the Data Protection Supervisor”.

Source: La Repubblica

Previous

A Guide To The Best Surf Spots In Italy

The Roman Expeditions of the Nile River

Next
Get new posts by email:

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.