July 16, 2012 at 3:34 PM ET
Hacking group Anonymous has posted 1,000 email credentials from employees working at Shell, Exxon Mobil, BP and Russian companies Gazprom and Rosneft on a file-sharing site. The oil companies have been among the hacking group's targets, with Anonymous citing drilling activities in the Arctic as part of its #OpSaveTheArctic campaign.
"We know we’re going up against the most powerful countries and companies in the world," the group said on the PasteBin file-sharing site. "But together we have something stronger than any country’s military or any company’s budget. Our shared concern for the planet we leave our children transcends all the borders that divide us and makes us — together — the most powerful force today."
Anonymous said that it is supporting a Greenpeace petition against drilling in the Arctic, and "to show our support to the cause, just after the employees of Exxon were hacked, we used their email IDs to sign the petition."
NovaInfosecPortal.com, a news and resource site for information security professionals in the Washington, D.C., Virginia and Maryland areas, noted there were two data dumps of the information. The first was June 26 "and included 317 emails and corresponding MD5 hashed passwords," and the second was July 13 and "contained 26 emails and clear text passwords as well as 724 emails and hashed passwords."
Meanwhile, Monday Anonymous said on Twitter it posted more than 700,000 Yahoo IDs with usernames and passwords on PasteBin.
NBCNews.com contacted Yahoo for comment, and will update this post when we hear back.
The news adds to Yahoo's recent woes. Last week, a hacker group known as D33Ds Company, said it obtained 450,000 user email addresses and passwords stolen from Yahoo Voices, Yahoo's user-generated content service formerly known as Associated Content.
Yahoo said late last week that it fixed the vulnerability that allowed the Yahoo Voices hack, and that it has also put into place "additional security measures for affected Yahoo! users, enhanced our underlying security controls and are in the process of notifying affected users."
— Via The Next Web