Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/3/2013
10:45 AM
50%
50%

Stratfor Hacker: FBI Entrapment Shaped My Case

Hacker Jeremy Hammond asks for leniency before sentencing, citing the role of FBI informant Sabu in his case. How far can the FBI go with suspected computer criminals?

It's clear that Monsegur, who was quietly arrested by the FBI in June 2011 and immediately turned informant -- before later pleading guilty to a number of charges -- was being run by the FBI. Furthermore, prosecutors have said that he's monitored around the clock, and restricted to using an FBI-provided computer that records everything he does.

That means that Sabu, and thus the FBI, knew about the Stratfor hack before it happened. Notably, Hammond, using the handle "Sup_g," told Sabu on Dec. 6, 2011, that he planned to hack Stratfor, then did so a week later. Sabu, meanwhile, directed Hammond to upload the stolen data to a server that was really controlled by the FBI. But on Dec. 24, after Sabu reportedly attempted to sell the Stratfor data to Julian Assange at WikiLeaks -- he declined the offer -- Hammond publicly released the data. Two days later, Sabu tied Sup_g to another alias, "Anarchaos," that the bureau knew belonged to Hammond. But several months followed before the FBI arrested Hammond.

Could Stratfor's customer database have been protected -- and $2.5 million in damages and cleanup costs avoided? "Jeremy is about to get sentenced for the Stratfor part based on their assessed damages," alternative media expert Nigel Parry, who's been following Hammond's case, told me via email. "And a lot of those damages -- after we get beyond the early part of the hack that netted the credit card numbers (i.e. Stratfor's email losses, its data deletion) -- seem to me to be the direct result of the FBI's blatant hands-off approach and Stratfor's inept sysadmins, who didn't have a single backup of their data?!"

[ Was entrapment involved in the Silk Road arrest? Read Silk Road Founder Arrested. ]

The FBI appears to stand on solid legal ground here. "Unfortunately, there are numerous cases holding that the government has no obligation to mitigate damages, or intervene in a criminal investigation to mitigate the fallout or consequences," attorney Jeff Ifrah said. "There have been cases that have held in different contexts that the government may have been a contributing factor or intervening factor in the loss, but that type of logic ... has not been applied in a loss calculation scenario at a federal criminal sentencing proceeding," he said.

In other words, there's no precedent for getting a sentence -- or restitution -- reduced, owing to FBI entrapment. "In a sentencing context, the only relevant determination is foreseeable loss, or in some circumstances, actual loss," Ifrah said. "But courts default to the former and thus that becomes a crutch to ignore what role the FBI -- in this case -- did or did not play," he said.

The moral of the story: the FBI can entrap hackers, and businesses that have been owned by said hackers may get used as bait. So, would-be hackers, beware the FBI. And businesses -- especially ones that bill themselves as being private intelligence contractors, yet which store credit card data in plaintext format and see a crucial database get owned by a simple SQL injection attack -- make sure your information security defenses are strong enough to prevent you becoming hackbait.

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
OtherJimDonahue
50%
50%
OtherJimDonahue,
User Rank: Apprentice
10/8/2013 | 12:54:40 PM
re: Stratfor Hacker: FBI Entrapment Shaped My Case
While I agree with you ... yeesh, I really wish the government didn't align itself with people like Sabu.
GAProgrammer
50%
50%
GAProgrammer,
User Rank: Guru
10/7/2013 | 5:34:12 PM
re: Stratfor Hacker: FBI Entrapment Shaped My Case
Based on his supporter's arguments, if you rob a bank to give money to the less fortunate, you should not be charged. Ludicrous.
Laurianne
50%
50%
Laurianne,
User Rank: Apprentice
10/4/2013 | 6:15:41 PM
re: Stratfor Hacker: FBI Entrapment Shaped My Case
Like John McAfee's recent exploits, Sabu's story still sounds like an unbelievable novel.
majenkins
50%
50%
majenkins,
User Rank: Apprentice
10/4/2013 | 5:47:56 PM
re: Stratfor Hacker: FBI Entrapment Shaped My Case
Whether there was entrapment or not this time, these were not his first hacking crimes. Of course even if it was entrapment the fact that evidence doesn't exist to prosecute him for the other crimes of course doesn't make it right to falsely convict him in this case but it does seem to achieve a little justice.
News
US Formally Attributes SolarWinds Attack to Russian Intelligence Agency
Jai Vijayan, Contributing Writer,  4/15/2021
News
Dependency Problems Increase for Open Source Components
Robert Lemos, Contributing Writer,  4/14/2021
News
FBI Operation Remotely Removes Web Shells From Exchange Servers
Kelly Sheridan, Staff Editor, Dark Reading,  4/14/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-22893
PUBLISHED: 2021-04-23
Pulse Connect Secure 9.0R3/9.1R1 and higher is vulnerable to an authentication bypass vulnerability exposed by the Windows File Share Browser and Pulse Secure Collaboration features of Pulse Connect Secure that can allow an unauthenticated user to perform remote arbitrary code execution on the Pulse...
CVE-2021-31408
PUBLISHED: 2021-04-23
Authentication.logout() helper in com.vaadin:flow-client versions 5.0.0 prior to 6.0.0 (Vaadin 18), and 6.0.0 through 6.0.4 (Vaadin 19.0.0 through 19.0.3) uses incorrect HTTP method, which, in combination with Spring Security CSRF protection, allows local attackers to access Fusion endpoints after t...
CVE-2021-31410
PUBLISHED: 2021-04-23
Overly relaxed configuration of frontend resources server in Vaadin Designer versions 4.3.0 through 4.6.3 allows remote attackers to access project sources via crafted HTTP request.
CVE-2021-31539
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has cleartext passwords stored in the conf/admin.password file. A regular local user is able to read usernames and passwords.
CVE-2021-31540
PUBLISHED: 2021-04-23
Wowza Streaming Engine through 4.8.5 (in a default installation) has incorrect file permissions of configuration files in the conf/ directory. A regular local user is able to read and write to all the configuration files, e.g., modify the application server configuration.