Hackers have broken into the blogging site of chip manufacturer AMD, stealing and publishing nearly 200 staff usernames, email addresses and hashed passwords.
The group, dubbed R00tbeer, broke into the site over the weekend and published a SQL file containing 185 AMD login details to file sharing websites.
The purported account of AMD technology group general manager Checkib Akrout was included in the leaked files.
AMD has taken down the blogging site, claiming “routine maintenance”.
The same hacker group also claimed responsibility for an attack on popular forum TheBotNet.com, after its homepage was defaced and 96,947 user email addresses and hashed passwords were leaked.
The website, dedicated to “personal gain via the internet”, uses bots to cash in on sweepstakes, giveaways and push traffic to advertising.
Administrators urged users to change any compromised passwords reused on other sites. The hole has since been patched.
AMD provided the following statement to CRN sister site SC.
"AMD's blog site was the target of an attack on August 19th. We believe that the attackers posted less than 200 registered usernames and salted password hashes to a hacker web site. AMD uses salted password hashes, which is an industry best practice for encryption and extremely difficult to crack.
"We immediately took the blog site offline and changed all passwords. AMD remains committed to data security and user privacy and has launched an investigation into this matter. We expect to bring our blog site back online within the next 24 hours."
Updated 12/8/12 with AMD comment.
Copyright © SC Magazine, Australia
Issue: 339 | June 2015
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.