After conducting a "transaction response" to avenge Julian Assange, founder of Wikileaks, the group attacked Anonymous, Sunday, Feb. 6, an American security company, Federal HBGary, accused of collaborating with the intelligence services to identify members of the network of "hacktivists". Tens of thousands of emails have been intercepted and for several hours, the company's website was inaccessible, replaced with a message: "You tried to bite the hand now Anonymous and Anonymous's hand slap.
" The Twitter account of Aaron Barr, CEO of the company, was also hacked. If members of the group Anonymous often use software such as Loic, to perform denial of service attacks (to saturate the servers consisting of a site applications), many experts have explained that in the case of HBGary, the attack was much more sophisticated.
According to an article in the Ars Technica website, published Wednesday, February 16, Anonymous has exploited a loophole in the system of content management (Content Management System or CMS) that facilitates the updating of content on a website. "For reasons known only to HBGary, the company decided to entrust a third party developer the implementation of such a system," whose code was, in the end, "poorly written" and contained "a bug ".
By exploiting this vulnerability, members of Anonymous were able to steal passwords used by employees of HBGary to update the site pages. "It also appears that Aaron Barr, Ted and Vera [another company official], used the same passwords for their accounts Twitter and LinkedIn, and even an account that administers all mails from the company "says the security firm Sophos, on his blog.
With such a database, "it becomes easy for hackers to steal all mails from the company, and deface [that is to say, change the appearance] its website", says Sophos . A CAMPAIGN to discredit IN PREPARATION OF Wikileaks To justify the attack tale HBGary, Anonymous was first raised the threat of some members of the group identified and delivered to the authorities.
But as the recent documents, including posted on the site Wikileaks. hp HBGary and two other companies business intelligence, and Palantir Technologies Berico Technologies had also developed a "battle plan" against what they describe as "WikiLeaks threat." "The traditional answers fail", prevent signatories of the report.
The three companies in their paper describe several "tactics" to undermine the site specializes in the disclosure of confidential documents. "A media campaign intended to show the radical nature of the activities" of Wikileaks, or maintain a "sustained pressure with no effect on the fanatics, but that casts doubt among the most moderate", are all measures proposed by the companies.
And HBGary, Palantir Berico and noted that "despite the publicity, Wikileaks is not a healthy situation at the moment. This weakness is a major source of stress in the organization, it is possible to exploit." The three companies are especially before the lack of financial resources of the site co-founded by Julian Assange.
" The Twitter account of Aaron Barr, CEO of the company, was also hacked. If members of the group Anonymous often use software such as Loic, to perform denial of service attacks (to saturate the servers consisting of a site applications), many experts have explained that in the case of HBGary, the attack was much more sophisticated.
According to an article in the Ars Technica website, published Wednesday, February 16, Anonymous has exploited a loophole in the system of content management (Content Management System or CMS) that facilitates the updating of content on a website. "For reasons known only to HBGary, the company decided to entrust a third party developer the implementation of such a system," whose code was, in the end, "poorly written" and contained "a bug ".
By exploiting this vulnerability, members of Anonymous were able to steal passwords used by employees of HBGary to update the site pages. "It also appears that Aaron Barr, Ted and Vera [another company official], used the same passwords for their accounts Twitter and LinkedIn, and even an account that administers all mails from the company "says the security firm Sophos, on his blog.
With such a database, "it becomes easy for hackers to steal all mails from the company, and deface [that is to say, change the appearance] its website", says Sophos . A CAMPAIGN to discredit IN PREPARATION OF Wikileaks To justify the attack tale HBGary, Anonymous was first raised the threat of some members of the group identified and delivered to the authorities.
But as the recent documents, including posted on the site Wikileaks. hp HBGary and two other companies business intelligence, and Palantir Technologies Berico Technologies had also developed a "battle plan" against what they describe as "WikiLeaks threat." "The traditional answers fail", prevent signatories of the report.
The three companies in their paper describe several "tactics" to undermine the site specializes in the disclosure of confidential documents. "A media campaign intended to show the radical nature of the activities" of Wikileaks, or maintain a "sustained pressure with no effect on the fanatics, but that casts doubt among the most moderate", are all measures proposed by the companies.
And HBGary, Palantir Berico and noted that "despite the publicity, Wikileaks is not a healthy situation at the moment. This weakness is a major source of stress in the organization, it is possible to exploit." The three companies are especially before the lack of financial resources of the site co-founded by Julian Assange.
No comments:
Post a Comment