Attacks/Breaches
2/28/2012
12:14 PM
50%
50%

WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure

Hacktivist group Anonymous said it obtained the intelligence contractor's clear-text emails, and shared them with whistleblower and information-release website WikiLeaks, as part of a new working relationship.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The hacktivist collective Anonymous Sunday announced a new partnership with whistleblowing website WikiLeaks, followed by the release Monday of a collection of 5 million emails from Texas-based Stratfor (aka Strategic Forecasting), which bills itself as "a subscription-based provider of geopolitical analysis."

Stratfor Monday released a statement denouncing the email release as "a deplorable, unfortunate--and illegal--breach of privacy" and launched a damage-control campaign seeking to discredit the emails, saying they could have been altered by Anonymous. But Stratfor refused to confirm or deny any of the emails' contents. "Having had our property stolen, we will not be victimized twice by submitting to questioning about them," it said.

Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The new leak represents a homecoming for WikiLeaks, which has released few documents after publishing a massive trove of sensitive, unredacted government cables. But the site's operations had apparently been hobbled after MasterCard and PayPal ceased allowing people to donate to the site. Meanwhile, the site's founder, Julian Assange, remains under house arrest in England as he fights extradition to Sweden to face allegations of rape and sexual misconduct.

With the Stratfor emails, WikiLeaks said that it was working with more than 25 media organizations--including Rolling Stone, La Repubblica in Italy, and Russia Reporter--as well as activist groups to analyze and publicize the contents of the emails. Interestingly, that list didn't appear to include any of the media organizations that had participated in the analysis of the government cables that WikiLeaks obtained, perhaps owing to the whistleblowing website's decision to release the cables itself, in unredacted form, after Assange apparently lost control of a BitTorrent archive containing a copy of every cable.

Given that misstep, why might Anonymous suddenly be sharing information with WikiLeaks? "WikiLeaks has great means to publish and disclose," a described member of Anonymous told Wired. "Also, they work together with media in a way we don't." Members of Anonymous and its AntiSec branch have reportedly said that the working relationship could continue, with future leaks being made on a regular basis.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 7:01:43 AM
re: WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure
Thanks for sharing the info
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.