Get flash to fully experience Pearltrees
The FBI broke the news to executives at DuPont Co. late last year that hackers had cracked the company’s computer networks for the second time in 12 months, according to a confidential Dec. 9, 2010, e-mail discussing the investigation. About a year earlier, DuPont had been hit by the same China- based hackers who struck Google Inc. (GOOG) and unlike Google, DuPont kept the intrusion secret, internal e-mails from cyber-security firm HBGary Inc. show. As DuPont probed the incidents, executives concluded they were the target of a campaign of industrial spying, the e-mails show. Enlarge image
Last week, the loose-knit hacking collective Anonymous stole over 50,000 emails from security researcher Aaron Barr . Now they're launching the Wikileaks-style Anonleaks.ru , to make it easy for anyone to browse Barr and his colleagues' private emails. Want to read the excruciating love letter a security company executive sent her husband? Anonymous attacked Barr and the security company he worked for, HBGary Federal, on Sunday after he (wrongly) boasted to a reporter about having identified Anonymous' "leaders." In just a few minutes, Anonymous broke into HBGary's computers, then posted an archive of HBGary corporate emails on The Pirate Bay.
The sociopaths at Anonymous are once again aligning themselves with cyber criminals. You may recall that they hooked up with Heihachi some time ago. Now they are launching AnonLeaks as a replacement for wikileaks. While AnonLeaks is being promoted through social media, and a free sites such as blogger, they have also launched a subdomain at malware domain pcriot.com. Google Safe Browsing paints a pretty ugly picture: “Malicious software includes 1 scripting exploit(s), 1 trojan(s), 1 exploit(s). Successful infection resulted in an average of 1 new process(es) on the target machine.” http://www.google.com/safebrowsing/diagnostic?
4 August 2010. Volunteer Tells about Project Vigilant Fraud: http://www.reddit.com/r/IAmA/comments/cx2t8/iama_volunteer_for_project_vigilant_amaa/ 3 August 2010.
4 August 2010. Volunteer Tells about Project Vigilant Fraud: http://www.reddit.com/r/IAmA/comments/cx2t8/iama_volunteer_for_project_vigilant_amaa/ 3 August 2010 After posting the file below, Google cache provided evidence that Project Vigilant is a fraud:
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE . Please click on the link in the email to verify your email address. You need to verify your email before you can start posting. If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter.
When Aaron Barr was finalizing a recent computer security presentation for the US Transportation Security Administration, a colleague had a bit of good-natured advice for him: "Scare the sh*t out of them!" In retrospect, this may not have been the advice Barr needed. As CEO of the government-focused infosec company HBGary Federal, Barr had to bring in big clients—and quickly—as the startup business hemorrhaged cash. To do so, he had no problem with trying to "scare the sh*t out of them."
The tendency to relate past events to what is possible in the present becomes more difficult as the scope of the geopolitical environment changes. It is a useful thing, then, to ask every once in a while if the environment has recently undergone any particular severe changes, thereby expanding our options for the future. Terminology, let alone our means of exchanging information, has changed to such a degree that many essential discussions in today's "communications age" would be entirely incomprehensible to many two decades ago. As the social, political and technological environment has developed, some have already begun to explore new options, seizing new chances for digital activism - and more will soon join in.
One of the big outstanding questions in the story of the plot to undermine WikiLeaks and Salon’s Glenn Greenwald, as well as a separate plan to discredit critics of the Chamber of Commerce, is the nature of the role played by the large international law firm Hunton & Williams. Hunton, which brags it employs 1,000 lawyers in 18 offices on three continents, has worked for both the Chamber and Bank of America. The company is nervous because WikiLeaks is reportedly planning to release internal bank documents, and Bank of America apparently connected with Hunton to help respond to the crisis. Hunton attorneys in turn had a series of e-mail communications — since hacked by WikiLeaks supporters and published online — with a trio of technology firms that proposed various schemes to attack WikiLeaks, Greenwald and critics of the Chamber.
The group of anonymous "hacktivists" that made headlines for online cyberattacks in December just released a bombshell online: a decrypted version of the same cyberworm that crippled Iran's nuclear power program. The ones and zeroes that make up the code called the Stuxnet worm -- described as the most sophisticated cyberweapon ever created -- were reportedly found when the faceless group hacked into the computers of HBGary, a U.S. security company that the anonymous collective viewed as an enemy. And the security experts FoxNews.com spoke with said the leaked code was serious cause for concern.