The author is once again Rogue0, the hacker whom last year has attacked the operating system of the Cinquestelle party.
New hacker attack on the Rousseau platform. Rogue0, the hacker whom last year breached the operating system of the Five Star Movement, is back in action, sharing on his Twitter profile, a few hours ago, two links leading to the site Privatebin.net, where the data related to the M5S platform database have been published.
Big news & #tables at #Rousseau Market , collection #Summer2k18 is out!
Great & Useless changes from #casaleggio, for a nice low price!
New tables, new #Hash , phones, emails… and so,@casaleggio ?https://t.co/L5srTaSTdP#M5S #GDRP#pisQAnon is better than nothing#APT0
— rogue0 (@r0gue_0) September 5, 2018
What is the Rousseau platform?
The Rousseau platform is an application reachable on the web where the registered users of M5S can discuss, approve or reject legislative proposals (submitted then in the Parliament by the M5S group).
The platform is controlled by Casaleggio Associati, an internet and publishing company that advises on network strategies, and editor of Beppe Grillo’s blog. Casaleggio Associati has been founded by Gianroberto Casaleggio, co-founder, with Beppe Grillo, of the Five Star Movement. The company is now lead by his son Davide.
One of the two links would refer to a list of donations made last July with names, surnames, amounts, and emails from unencrypted donors. The other link shared by Rogue0 would lead to a list of recent tables in the Rousseau database.
According to Marco Canestrari, blogger and former employee of ‘Casaleggio Associati’,the attack is problematic if it would be determined that the system was not updated, as they declared some time ago answering to the Data Protection Supervisor requests.
Sono acidissimi cavoli, soprattutto se si venisse a scoprire che i sistemi non sono aggiornato, come invece hanno dichiarato tempo fa (“tutte le richieste del Garante sono soddisfatte”).
— Marco Canestrari (@marcocanestrari) September 5, 2018
In another tweet, the hacker publishes what according to the debunker and computer expert David Puente could be “the probable username of the database administrator in possession of the blackhat”.
“If these data are confirmed, it will not be good news for the platform’s managers, in addition to having to review the security of the entire structure, they will have to communicate to the Data Protection Supervisor and the users involved on what happened”, writes Puente on his blog.
The Data Protection Supervisor informs that they have initiated the first checks to “verify whether the data breach was determined by the same causes found in the past, already subject to a provision of the Data Protection Supervisor”.
Source: La Repubblica