Attacks/Breaches
2/28/2012
12:14 PM
Connect Directly
RSS
E-Mail
50%
50%

WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure

Hacktivist group Anonymous said it obtained the intelligence contractor's clear-text emails, and shared them with whistleblower and information-release website WikiLeaks, as part of a new working relationship.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
The hacktivist collective Anonymous Sunday announced a new partnership with whistleblowing website WikiLeaks, followed by the release Monday of a collection of 5 million emails from Texas-based Stratfor (aka Strategic Forecasting), which bills itself as "a subscription-based provider of geopolitical analysis."

Stratfor Monday released a statement denouncing the email release as "a deplorable, unfortunate--and illegal--breach of privacy" and launched a damage-control campaign seeking to discredit the emails, saying they could have been altered by Anonymous. But Stratfor refused to confirm or deny any of the emails' contents. "Having had our property stolen, we will not be victimized twice by submitting to questioning about them," it said.

Stratfor appears to have run afoul of Anonymous and WikiLeaks on account of its intelligence-gathering activities. A blog post published Sunday on the AnonOps Communications blog, a reliable source of Anonymous-related information, accused Stratfor of being "a company that fronts as an intelligence publisher, but provides confidential intelligence services to large corporations, such as Bhopal's Dow Chemical Co., Lockheed Martin, Northrop Grumman, Raytheon, and government agencies, including the U.S. Department of Homeland Security, the U.S. Marines and the U.S. Defense Intelligence Agency."

[ See our complete RSA 2012 Security Conference coverage, live from San Francisco. ]

The new leak represents a homecoming for WikiLeaks, which has released few documents after publishing a massive trove of sensitive, unredacted government cables. But the site's operations had apparently been hobbled after MasterCard and PayPal ceased allowing people to donate to the site. Meanwhile, the site's founder, Julian Assange, remains under house arrest in England as he fights extradition to Sweden to face allegations of rape and sexual misconduct.

With the Stratfor emails, WikiLeaks said that it was working with more than 25 media organizations--including Rolling Stone, La Repubblica in Italy, and Russia Reporter--as well as activist groups to analyze and publicize the contents of the emails. Interestingly, that list didn't appear to include any of the media organizations that had participated in the analysis of the government cables that WikiLeaks obtained, perhaps owing to the whistleblowing website's decision to release the cables itself, in unredacted form, after Assange apparently lost control of a BitTorrent archive containing a copy of every cable.

Given that misstep, why might Anonymous suddenly be sharing information with WikiLeaks? "WikiLeaks has great means to publish and disclose," a described member of Anonymous told Wired. "Also, they work together with media in a way we don't." Members of Anonymous and its AntiSec branch have reportedly said that the working relationship could continue, with future leaks being made on a regular basis.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
Sabrina
50%
50%
Sabrina,
User Rank: Apprentice
3/1/2012 | 7:01:43 AM
re: WikiLeaks Stratfor Disclosure Highlights Email Encryption Failure
Thanks for sharing the info
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.