Attacks/Breaches
2/28/2012
12:14 PM
50%
50%

WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure

Hacktivist group Anonymous said it obtained the intelligence contractor's clear-text emails, and shared them with whistleblower and information-release website WikiLeaks, as part of a new working relationship.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The hacktivist collective Anonymous Sunday announced a new partnership with whistleblowing website WikiLeaks, followed by the release Monday of a collection of 5 million emails from Texas-based Stratfor (aka Strategic Forecasting), which bills itself as "a subscription-based provider of geopolitical analysis."

Stratfor Monday released a statement denouncing the email release as "a deplorable, unfortunate--and illegal--breach of privacy" and launched a damage-control campaign seeking to discredit the emails, saying they could have been altered by Anonymous. But Stratfor refused to confirm or deny any of the emails' contents. "Having had our property stolen, we will not be victimized twice by submitting to questioning about them," it said.

Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The new leak represents a homecoming for WikiLeaks, which has released few documents after publishing a massive trove of sensitive, unredacted government cables. But the site's operations had apparently been hobbled after MasterCard and PayPal ceased allowing people to donate to the site. Meanwhile, the site's founder, Julian Assange, remains under house arrest in England as he fights extradition to Sweden to face allegations of rape and sexual misconduct.

With the Stratfor emails, WikiLeaks said that it was working with more than 25 media organizations--including Rolling Stone, La Repubblica in Italy, and Russia Reporter--as well as activist groups to analyze and publicize the contents of the emails. Interestingly, that list didn't appear to include any of the media organizations that had participated in the analysis of the government cables that WikiLeaks obtained, perhaps owing to the whistleblowing website's decision to release the cables itself, in unredacted form, after Assange apparently lost control of a BitTorrent archive containing a copy of every cable.

Given that misstep, why might Anonymous suddenly be sharing information with WikiLeaks? "WikiLeaks has great means to publish and disclose," a described member of Anonymous told Wired. "Also, they work together with media in a way we don't." Members of Anonymous and its AntiSec branch have reportedly said that the working relationship could continue, with future leaks being made on a regular basis.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 7:01:43 AM
re: WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure
Thanks for sharing the info
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?