SA Government Officials Busted As Visitors Of Online Porn


Report culled from mybroadband relates that South African government departments were exposed as visitors of online porn following the hacking of Brazzers porn forum.

According to the report, about 800,000 unique email addresses, usernames, and plain text passwords were exposed after the Brazzers porn site forum was hacked.

And, the details of South Africa government officials were found therein.

Read Also: Hurray! E-Cape Residents Now Have Free Public Wi-Fi

As reported, Brazzers porn site’s operator told mybroadband that the site’s database contains 519 email address from South African domains.

The operator divulged that most of the addresses are domains. One is an domain whereas four are domains.

With that, the under-listed government departments were identified as those with staff who signed up on the porn forum.

  1. (Limpopo Department of Agriculture and Rural Development)
  2. (Hantam Municipality in the Northern Cape)
  3. (The Department of Justice)
  4. (South African Revenue Service)

Confirming this incident, Motherboard reported that accounts for the popular porn site were exposed in a data breach.

“Although the data originated from the company’s separate forum, Brazzers users who never signed up to the forum may also find their details included in the dump,” read an excerpt from the report.

Check Out: “Don’t Despair, Government Will Put More Money Into Your Pockets” – Minister Muthambi

Matt Stevens, a public relation manager from Brazzers told Motherboard that Brazzers took corrective measures to protect users.

“This matches an incident which occurred in 2012 with our ‘Brazzersforum,’ which was managed by a third party. The incident occurred because of a vulnerability in the said third party software, the ‘vBulletin’ software, and not Brazzers itself.

“That being said, users’ accounts were shared between Brazzers and the ‘Brazzersforum’ which was created for user’s convenience. That resulted in a small portion of our user accounts being exposed and we took corrective measures in the days following this incident to protect our users,” Stevens related.

Topics: >