Data dump exposes names, addresses, salary info on job candidates
A hacker today claimed to have broken into ITWallStreet.com, a website for IT professionals who are seeking Wall Street jobs or working with Wall Street firms, and exposed highly detailed data belonging to tens of thousands of job applicants.
As many as 12 data files containing detailed information on job applicants were publicly posted today after they had apparently been accessed from an ITWallStreet database by a hacker who's a member of a group called TeamGhostShell.
A Computerworld inspection of the published data showed the first and last names, mailing addresses, email addresses, usernames, hashed passwords and phone numbers of what appear to be thousands of people who have applied for IT jobs with Wall Street firms. Many of the thousands of hashed passwords appear to have already been decrypted into their clear text form.
The data dump included details such as salary and bonus expectations of the job seekers and even feedback on specific candidates. One of the published files, for instance, contained snippets of email exchanges presumably between recruiters and account managers discussing the viability of certain candidates for specific jobs.
Another file contained records of thousands of phone calls apparently between recruiters and candidates. The records contained details such as the phone number dialed, and the time, date and duration of the call. One contained a list of references apparently supplied by a job candidate.
The salary expectations of job candidates ranged from $40,000 to more than $400,000, suggesting that ITWallStreet's breached resume database included everyone from entry-level IT professionals to senior technology executives. In fact, several of the published email exchanges referred to candidates who appeared to have applied for vice-president-level positions on Wall Street.
One of the published files contained a detailed list of what appeared to be hundreds of clients of ITWallStreet.com. The list contains virtually every major Wall Street firm, including Morgan Stanley, Goldman Sachs, Nasdaq, Dow Jones, Moody's and Wachovia Bank.
Andiamo Partners, the New York-based recruiting firm that operates the website did not confirm or deny the breach. A spokeswoman said the company would respond later, presumably after verifying the claims. It was not immediately possible to confirm if any of the posted data came from the company's database or pertained to IT job applicants, as the hacker claimed.
It was also difficult to immediately verify how many people may have been affected by the breach. According to "Masakaki," the hacker who claimed credit for the breach, more than 50,000 accounts pertaining to "current, past, and rejected IT personal [sic] from Wall Street" have been compromised. Masakaki claimed to have more than 3,000 resumes and vowed "to trade them on the black market."
In a statement announcing the breach, Masakaki suggested the attack was meant as a show of support for the Occupy Wall Street movement. The hacker claimed to belong to "MidasBank," a group that is part of TeamGhostShell, according to the statement.
"GhostShell has been leaking left and right all kinds of targets, well we're here to bring some sort of order to it which is why this district will function solely to provide leaks from an economical point of view," the statement noted. "What better target to pick as a first release, than the place that puts all markets to shame in the world. Wall Street. IT Wall Street owned," the statement read.
According to its website, Andiamo Partners is the leading technology recruiting firm for the financial services sector. The company helps Wall Street firms find IT professionals to work in areas such as development, infrastructure, database and process management.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at Twitter @jaivijayan, or subscribe to Jaikumar's RSS feed Vijayan RSS. His email address is email@example.com.
See more by Jaikumar Vijayan on Computerworld.com.