Attacks/Breaches
2/28/2012
12:14 PM
50%
50%

WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure

Hacktivist group Anonymous said it obtained the intelligence contractor's clear-text emails, and shared them with whistleblower and information-release website WikiLeaks, as part of a new working relationship.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The hacktivist collective Anonymous Sunday announced a new partnership with whistleblowing website WikiLeaks, followed by the release Monday of a collection of 5 million emails from Texas-based Stratfor (aka Strategic Forecasting), which bills itself as "a subscription-based provider of geopolitical analysis."

Stratfor Monday released a statement denouncing the email release as "a deplorable, unfortunate--and illegal--breach of privacy" and launched a damage-control campaign seeking to discredit the emails, saying they could have been altered by Anonymous. But Stratfor refused to confirm or deny any of the emails' contents. "Having had our property stolen, we will not be victimized twice by submitting to questioning about them," it said.

Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The new leak represents a homecoming for WikiLeaks, which has released few documents after publishing a massive trove of sensitive, unredacted government cables. But the site's operations had apparently been hobbled after MasterCard and PayPal ceased allowing people to donate to the site. Meanwhile, the site's founder, Julian Assange, remains under house arrest in England as he fights extradition to Sweden to face allegations of rape and sexual misconduct.

With the Stratfor emails, WikiLeaks said that it was working with more than 25 media organizations--including Rolling Stone, La Repubblica in Italy, and Russia Reporter--as well as activist groups to analyze and publicize the contents of the emails. Interestingly, that list didn't appear to include any of the media organizations that had participated in the analysis of the government cables that WikiLeaks obtained, perhaps owing to the whistleblowing website's decision to release the cables itself, in unredacted form, after Assange apparently lost control of a BitTorrent archive containing a copy of every cable.

Given that misstep, why might Anonymous suddenly be sharing information with WikiLeaks? "WikiLeaks has great means to publish and disclose," a described member of Anonymous told Wired. "Also, they work together with media in a way we don't." Members of Anonymous and its AntiSec branch have reportedly said that the working relationship could continue, with future leaks being made on a regular basis.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 7:01:43 AM
re: WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure
Thanks for sharing the info
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.