{"id":5977,"date":"2018-11-28T06:09:22","date_gmt":"2018-11-28T11:09:22","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5977"},"modified":"2018-11-28T06:09:22","modified_gmt":"2018-11-28T11:09:22","slug":"real-identity-of-hacker-who-sold-linkedin-dropbox-databases-revealed","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/11\/28\/real-identity-of-hacker-who-sold-linkedin-dropbox-databases-revealed\/","title":{"rendered":"Real Identity of Hacker Who Sold LinkedIn, Dropbox Databases Revealed"},"content":{"rendered":"<p>The real identity of Tessa88\u2014the notorious hacker tied to several high-profile cyber attacks including the LinkedIn, Dropbox and MySpace mega breaches\u2014has been revealed as a resident of Penza, Russian Federation.<br \/>\nThe stolen data, taken years ago from several social media sites, included more than half a billion username and password combinations, which were then used in phishing, account takeover, and other cyber attacks.After exploring several confidential sources, Penza records, and Russian crime database, researchers find Tessa88 as Maksim Vladimirovich Donakov (date of birth: 02\/07\/1989), whose persona matches with the YouTube username \u2018Donakov,\u2019 Mitsubishi Lancer and person revealed in Imgur picture.<\/p>\n<p>https:\/\/thehackernews.com\/2018\/11\/tessa88-russian-hacker.html<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The real identity of Tessa88\u2014the notorious hacker tied to several high-profile cyber attacks including the LinkedIn, Dropbox and MySpace mega breaches\u2014has been revealed as a resident of Penza, Russian Federation. The stolen data, taken years ago from several social media sites, included more than half a billion username and password combinations, which were then used [&hellip;]<\/p>\n","protected":false},"author":17246,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[717225],"tags":[],"class_list":{"0":"post-5977","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-12-it-security","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/17246"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5977"}],"version-history":[{"count":1,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5977\/revisions"}],"predecessor-version":[{"id":5978,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5977\/revisions\/5978"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5977"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5977"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}