Hacktivist group GhostShell has posted log-in details of 1.6 million accounts they claim are taken from a series of attacks on organisations including NASA, the FBI and the European Space Agency.
The Anonymous subsidiary group posted the details to Pastebin, describing it as part of their #ProjectWhiteFox campaign to promote hactivism and freedom of information on the internet.
The posting of secure details includes log-in names, passwords, email addresses and CVs and marks GhostShell's final operation of 2012, the group say.
#ProjectWhiteFox will conclude this year's series of attacks by promoting hacktivism worldwide and drawing attention to the freedom of information on the net," read the statement.
"For those two factors we have prepared a juicy release of 1.6 million accounts/records from fields such as aerospace, nanotechnology, banking, law, education, government, military, all kinds of wacky companies & corporations working for the department of defense, airlines and more."
GhostShell say they have messaged security bosses about the insecurity a number of organisations they targeted during attacks throughout 2012, describing it as "an early Christmas present."
The group also poke fun at the authorities trying to track them down.
"Since it's our final stand this year, we've made the call to invite you guys to our event as well. How? Well, how about by starting with the fact that anti-terror agencies have been keeping an eye on us from the beginning," said the GhostShell post.
"GlobalTerrorAlert you and the rest thought were invisible just because your own websites were set to 'hidden'? Silly kids, if you're on the net, then you can be sure that someone is watching you, no matter how hard you try to hide." the group added.
Anonymous and its off-shoots have claimed responsibility for a number of cyber-attacks and information releases throughout 2012. These include strikes against the UK government and a DDoS attack targeting HSBC.
By eliminating high entry costs for big data analysis, you can convert more raw data into valuable business insight.
A discussion of the "risk perception gap", its implications and how it can be closed