Hackers discover government employees watch porn

A group of hackers calling themselves Th3 Consortium and claiming to be affiliated with Anonymous and LulzSec broke into yet DigitalPlaground.com, the third porn site it's hacked in as many weeks, stealing 72,000 passwords and 40,000 credit card numbers. All three porn sites Th3 Consortium has targeted are owned by Luxembourg-based Manwin: Brazzers got hit in mid-February -- 350,000 usernames and passwords were stolen -- and then came a major hack at YouPorn -- a million usernames and passwords were compromised. But the porn network does not seem to be the real target of the attack: the hackers seem most interested in embarrassing government employees who used their official email addresses (for some reason?) to register for a porn site. Foolish government employees beware.

As AVN.com reports, "According to Th3Consortium, it hacked 27 admins' names, usernames, e-mail addresses, and encrypted passwords; 85 affiliates' usernames, plaintext passwords, and in some cases, IP addresses; and 82 .gov and .mil e-mail addresses with corresponding plaintext passwords."

"And of course as this is a porn site," Th3 Consortium bragged in their release about the attack, "there was no shortage of .mil and .gov emails in their user list." The hackers' taunting of government employees could be nothing more than taunting. Those who have seen the data say that there are only a few dozen on the list.

Read more at the Atlantic Wire.

NEXT STORY: Army Kicks Off Manpack JTRS Buy