Stratfor
https://www.courtlistener.com/docket/4350549/68/13/united-states-v-ackroyd/
https://www.documentcloud.org/documents/2998983-LulzXmas-Redacted
https://en.wikipedia.org/wiki/Stratfor#Leaks
https://en.wikipedia.org/wiki/2012%E2%80%9313_Stratfor_email_leak
https://www.scribd.com/document/229261982/Stratfor-Computer-Forensic-Investigation
https://zone-h.org/mirror/id/16416728
https://www.dailydot.com/debug/hammond-sabu-fbi-stratfor-hack/
File:Antisec teaser 1225.txt
File:Antisec teaser 1229.txt
File:Antisec teaser 1229 (legit).txt
Explanation of the Hack
Stratfor was first discovered to have an open MySQL server by an anonymous hacker called Hyrriiya who then passed on the information to sup_g now known as Jeremy Hammond. MySQL by default has the user set to root with an empty password, this was the hole stratfor suffered from.
To access the server you do:
mysql -u root -h <stratfor>
Conversation between sup_g and Hyrriiya leading up to the Stratfor hack. https://uploads.dailydot.com/e04/15/antisec.jpg?auto=compress%2Cformat&ixlib=php-3.3.0