Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

8/6/2011
07:35 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

Building A Better 'Anonymous'?

DefCon 19 panel debates how the hacktivist collective could more effectively channel its energies for its own causes as well as for security

DEFCON 19 -- Las Vegas -- Aaron Barr was camouflaged in the audience here today rather than on the podium as the scheduled star panelist on the "Whoever Fights Monsters" session, while self-professed members of Anonymous later chimed in during a heated question-and-answer session.

The panel generated a provocative debate over whether the Anonymous hacktivist collective would be more effective if it retooled and focused its efforts -- as well as whether its very public hacks have actually prompted organizations to better secure their systems.

Barr, the former CEO of HBGary Federal who was targeted by Anonymous' LulzSec branch after promising to unmask some of its main members, at the eleventh hour had to pass on his slot on the panel due to the threat of a lawsuit from his former employer. But Barr's firsthand experience with being hacked, "doxed," and personally attacked by the hacktivist group served as a backdrop to the lively panel discussion, as well as the question-and-answer session at the DefCon 19 hacker convention.

The panel, moderated by Paul Roberts, editor of Threat Post, included Joshua Corman, director of security intelligence for Akamai; "Jericho" of Attrition.org; and "Krypt3ia," a security expert and blogger who began the session with his face masked ninja-style in a black scarf, identifying himself with the tongue-in-cheek pseudonym "Baron Von Aaarrrr." He later removed the mask after an audience member questioned the credibility of someone who would not show his face. "I'm overt, not covert," he said.

Akamai's Corman said Anonymous is more about chaos than white hats or black hats. "Anonymous isn't good or evil -- they're chaotic," Corman said. And the group and its brand of hacktivism and doxing isn't going away, he said.

But Anonymous' hacking, doxing, and exposing holes in organizations' security have not resulted in better security, he said. "My personal disappointment is if you think it makes security better by showing failure," that's not the case, he said.

Corman suggested that LulzSec would do better to channel its efforts on bad actors, such as child exploitation sites, for example, and cause "directed chaos."

"I'm not advocating vigilantism," however, he said. "But let's have a more intelligent discussion" rather than the seemingly random and chaotic attacks, he said.

Krypt3ia said calling out organizations for their weak or lax security wasn't the original purpose of Anonymous' attacks, anyway. "It was just an excuse made after the fact ... to [lend] it some legitimacy," he said.

And the mass-doxing strategy dilutes the impact Anonymous was going for, he said.

"You want to 'out' people for doing bad things? Well, cool, but do it right. Stop this crap of SQL injectioning and [leaking] unimportant data. The last dump on Mantech had one SBU [sensitive but unclassfiied] doc," he said. "So learn your target and know what you are doing. The real dirt comes out of insiders."

And it's possible the hacktivists could be getting misled by disinformation: "How do you know you have the real dirt? How do you know you are not getting disinformation?" Krypt3ia said. "I've seen companies already doing disinformation campaigns. Have Anonymous and LulzSec fallen into those traps?"

Jericho concurred that dumping massive amounts of uncensored data is ultimately relatively ineffective. "Releasing 250,000 cables is really cool, but it's hurting your cause. There's so much noise there and pointless documents. You could handpick them, or put them out one a day," for example, he said.

An audience member who said he works in Anonymous' LulzSec school responded to the discussion over the group's seemingly random and sometimes disparate activity. There are "eight different subcrews [in Anonymous] that each handle things differently," he said.

The panel basically agreed that protesting and calling out perceived injustices is a relatively positive goal of the group. But they also pointed to the lack of attribution. Dave Marcus, director of McAfee Labs security research communications who attended the session, says it's time for Anonymous to take ownership of its hacks and actions. "Do it openly and take credit for it," he said.

Gregg Housch, a member of Anonymous who participates in its chat rooms and protests but not in any hacking, says Anonymous should not have a particular focus. He says anyone can use the Anonymous "brand" in their hacktivist activities. "I'm not Anon, and I don't speak for Anonymous," he says.

He notes that some members left Anonymous after LulzSec's hack of HBGary and other organizations.

"If you leave Anonymous because you don't agree with something it did, then you don't belong in Anonymous," Housch says.

Have a comment on this story? Please click "Add Your Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 6/5/2020
Abandoned Apps May Pose Security Risk to Mobile Devices
Robert Lemos, Contributing Writer,  5/29/2020
How AI and Automation Can Help Bridge the Cybersecurity Talent Gap
Peter Barker, Chief Product Officer at ForgeRock,  6/1/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: What? IT said I needed virus protection!
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-13842
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). A dangerous AT command was made available even though it is unused. The LG ID is LVE-SMP-200010 (June 2020).
CVE-2020-13843
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS software before 2020-06-01. Local users can cause a denial of service because checking of the userdata partition is mishandled. The LG ID is LVE-SMP-200014 (June 2020).
CVE-2020-13839
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via a custom AT command handler buffer overflow. The LG ID is LVE-SMP-200007 (June 2020).
CVE-2020-13840
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 7.2, 8.0, 8.1, 9, and 10 (MTK chipsets). Code execution can occur via an MTK AT command handler buffer overflow. The LG ID is LVE-SMP-200008 (June 2020).
CVE-2020-13841
PUBLISHED: 2020-06-05
An issue was discovered on LG mobile devices with Android OS 9 and 10 (MTK chipsets). An AT command handler allows attackers to bypass intended access restrictions. The LG ID is LVE-SMP-200009 (June 2020).