US U.S. ‘No Fly List’ Leaks After Being Left in an Unsecured Airline Server - The list, which was discovered by a Swiss hacker, contains names and birth dates and over 1 million entries.

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.

1674308368663.png


A copy of the U.S. No Fly List has leaked after being stored on an unsecure server connected to a commercial airline. The No Fly List is an official list maintained by the U.S. government of people it has banned from traveling in or out of the United States on commercial flights.

As first reported by The Daily Dot, a Swiss hacker known as maia arson crimew discovered the list on an unsecured Jenkins server one night while poking around on Shodan, a search engine that lets people look through servers connected to the internet.

“Like so many other of my hacks this story starts with me being bored and browsing shodan (or well, technically zoomeye, Chinese shodan), looking for exposed jenkins servers that may contain some interesting goods,” crimew said in a blog about the leak. “At this point I've probably clicked through about 20 boring exposed servers with very little of any interest, when I suddenly start seeing some familiar words. ‘ACARS,’ lots of mentions of ‘crew’ and so on. Lots of words I've heard before, most likely while binge watching Mentour Pilot YouTube videos. Jackpot. An exposed jenkins server belonging to CommuteAir.”

On the server was a large amount of company data about CommuteAir, including the private information about its employees. There was also a file containing a copy of a 2019 edition of the No Fly List. The list includes names and birth dates and more than 1.5 million entries, but many of those entries are aliases that all reference the same person.“It’s so much bigger than I thought it’d be,” crimew told Motherboard.

“TSA is aware of a potential cybersecurity incident, and we are investigating in coordination with our federal partners,” a spokesperson for the TSA told Motherboard.

The United States has maintained a No Fly List for decades, but its number was much smaller in the days before 9/11 and only contained 16 people. After the attacks and the creation of the Department of Homeland Security, the list rapidly expanded. The exact number of people on the list is unknown, and the leaked data is a few years old and contains multiple entries for a single individual, but recent estimates put the total number at somewhere between 47,000 and 81,000 people.

“It’s a perverse outgrowth of the U.S. police and surveillance state,” crimew said. “Just a list with no due process…mostly just based on them being related to someone or being from the same village as someone. It’s so massive. I feel like this has no place anywhere. I feel like this doesn’t solve the problem.”

crimew told Motherboard they weren’t shocked to stumble on an unsecured copy of the No Fly List. “I’ve been digging into various jenkins [servers] for a while and there’s just so much to find,” they said. “It was just a matter of time until I found something like this.”

CommuteAir said the leak happened because of a misconfigured development server. “The researcher accessed files including an outdated 2019 version of the federal no-fly list that included first and last name and date of birth,” it said. “Additionally, through information found on the server the researcher discovered access to a database containing personal identifiable information of CommuteAir employees. Based on our initial investigation, no customer data was exposed. CommuteAir immediately took the affected server offline and started an investigation to determine the extent of data access. CommuteAir has reported the data exposure to the Cybersecurity and Infrastructure Security Agency, and also notified its employees.”



Check the blogpost, it's actually quite amusing.

 
>tranny
>autist
>types all lowercase like a faggot (Keffals)
>smug tone drips from each letter
>domain.gay
>"hacks" using a search engine
>anti-capitalist
>data on request only for "journalists"
>unemployed and wants donations to epically own da gubmint

Bingo! I win. It's a bingo
 
Maia is going through the internet-famous arc.

Interview in 3fach.ch radio (https://archive.is/1HZFq)
I started looking for journalists that would be interested in further working with me on this project. I usually contact journalists the moment I’ve hit something big - just so the hack can go public and won’t be covered up.


I continued working on the hack and gained full access on their AVS server structure as Mikael Thalen, a “Daily Dot” journalist, confirmed that he would publish my findings. But at that point I hadn’t found the list yet.
Well… I talked about it with Mikael and he quickly clicked through the test directory and was like: “Hey, I found the No Fly List!”. And I was like: “What, where?! I’ve been looking for it for the past two hours! How did you manage to find it in two minutes?!”. In the end it was just because he clicked on some folders that I hadn’t checked before… and there it was.
So this troon did not even find the list :lit:, it was the journo who he contacted. My sides. Checking the test directories is like hacking 101.


https://twitter.com/_nyancrimew/status/1617700454393352192 https://archive.is/staxt

He also started a clothing shop (https://archive.is/l4TMB) like every one of these lazy fuck internet microcelebrities. You can buy a plain t-shirt with some angsty text for 20 swiss francs. These gotta be the the most boring custom tees I've seen in my life.

Generic troon NPC vibe (I swear the all look identical)
https://twitter.com/_nyancrimew/status/1603075860742946816
1674638722923.png
 
I love how one or two autists here have dug more shit overnight about this weirdo than he has 'hacked' in the years he has been calling himself a "hacker".
This is a total nothingburger, as always they're as incompetent as they are smug.
I remember an old bit regarding Yanderedev that went something along the lines of "If a game developer is constantly talking about making their game, they're probably not actually making their game". It rings true for this guy in particlar. It's all a LARP for him and his opsec shows they're not actually a master leet hacker.
Dumbass has already earned the ire of the law and if he had anything damming then he'd be swiped up quickly and easily.
Shame, because for a moment I thought we'd be able to see which lolcows truly made it on the leaderboards.
 
Last edited:
When I heard that the hacker is not only an otherkin but a >she , my clocking radar started to go off charts,
because there's no way women, even autistic women with weird fixations would be into something autistic as computer hacking.
What, modern media lied to me that there's not a large group of women who can do any generic hacking that's required for the plot? I never! Next you'll tell me that female mechanics are rare, or that someone the size of your standard actress can't take someone the size of your standard actor hired to play a mook in standard one-on-one combat...

As to this hack? Fake and gay.
 
I remember when anarchists were based...
I don't, because they've never been. All anarchists are and have always been fuckwads with laughably retarded ideas, who expect the perfect society to be one where they bumble unproductively all day and life's necessities just fall from the sky, while being allowed to engage in all sorts of useless and degenerate behavior without being bothered by such pesky things as responsibilities or authority figures.
They're all the same regardless of whatever flavour they subscribe to: ancaps, ancoms (these are arguably worse than the others), anprims; they're all lunacy and saying that one is better than the other is like saying that rabbit shit is better than cow shit because it smells less.
Despite also whining about le ebil authoritarian state oppressing the people, they've always been very keen on murdering everyone who disagrees with them while making the lives of ordinary people harder by looting their buisnesses and organizing riots.
 
IF he were to actually have any data, he (at the very least) will provide some evidence of it. Think hashes, sample set, confirmed data from third parties. Hell, some cybersecurity experts even provide formatting and encoding as proof. I don't take the airline's confirmation as proof. They're likely trying to cover their asses with as broad as possible cover for leaked data. Judging by how its stated the info was found on their AWS infrastructure, I doubt their devs/team can ascertain what exactly the tranny accessed.

Furthermore, I work in the field and I've never seen anyone post sources via ddossecrets, which have had cases before where the submitted data was proven to be fake/extrapolated from prior leaks. I can't think of any reason to not allow third party verification, but send to the brushoff brigade other than what the tranny states - is fake. Also from the photo with that pokemon he posted, the .csv he has on background has plenty of empty delimiters. This could be unoccupied data for the columns in those entries, but if this gets sent out by the feds, I doubt it'll be unoptimized to just have placeholder commas. The stated duplicates also point me in that line of thought.
That, or the feds are just retarded and tech illiterate.
 
I am surprised that neither him nor the daily dot journalist got an early morning wakeup service from the kantonspolizei. While this guy leaked some documents before, it was all random tenders and other crap that anyone versed in shodan or google search syntax can find too.
This is a total nothingburger, as always they're as incompetent as they are smug.
[…]
It's all a LARP for him and his opsec shows they're not actually a master leet hacker
100% this. This guy is just a monster energy fuelled ADHD estrogen ball who knows what to type into Shodan. Even if he had the list, the fact that he breached into airline infrastructure, that could possibly process the list at some point, got him into shit so deep that he cannot even grasp it. Earlier in december and november his twitter feed had some nonchalant posting of the data he stole, now its mostly attention seeking and talking about the radio interview and other articles. He (and the Daily Dot journalist) are shitting bricks, and he is trying to cope with that by selling t-shirts (which he sucks at too, because his store is a default wordpress install with XML-RPC left enabled).

In all real leaks the perpetrators publish an anonymized (or not) sample of the data, or at least the table headers or anything else that gives them credibility. If he claims he has 1.5 million records, then publishing a random thousand with PII removed should be enough to authenticate himself as the list owner. But this thing is so over their heads.

Unless I see the sample rows, I do not believe he has the real list. Stealing the no-fly list is a crime one or two tiers more severe than breaking into some random company in the US, and if he really did it, then the FBI would already be on his ass. It's been a week and he was not visited by the cops yet.
 
Last edited:
Back