Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Anonymous Hacks Booz Allen, Taps 90,000 Military Emails

Hacker group claims defense contractor is developing software for manipulating social networks

The hacker group Anonymous says it has stolen some 90,000 military email addresses and password hashes from the management firm Booz Allen Hamilton, a major U.S. defense contractor.

"We infiltrated a server on their network that basically had no security measures in place," according to a message posted on thepiratebay.org. "We were able to run our own application, which turned out to be a shell and began plundering some booty."

In addition to the 90,000 email addresses, "we also added the complete sqldump, compressed ~50mb, for a good measure," the group says. Anonymous also claims to have pulled 4 GB of source code from Booz Allen's Apache SVN software revisioning and version control system and "wiped it from their system."

In addition, Anonymous said it "found maps and keys for various other treasure chests buried on the islands of government agencies, federal contractors, and shady whitehat companies. This material surely will keep our blackhat friends busy for a while."

Booz Allen did not make a statement about the alleged breach, but its Twitter account says, "Part of @BoozAllen security policy, we generally do not comment on specific threats or actions taken against our systems."

Anonymous claims Booz Allen is developing "a military project" to manipulate social networks to influence public opinion. The hacker group said it spent four man-hours hacking into the Booz Allen network.

Industry observers say the attack is a good example of the way that third-party suppliers and contractors could be targeted in an effort to reach a more prominent target, such as the U.S. federal government.

"The federal government in taking all the right steps in protecting its information, but they are under attack from all sides," says Joe Gottlieb, president and CEO of SIEM tool vendor SenSage. "The most challenging is that they have to maintain a trust model that spans across their supplier network. This breach is an example of how that can go sideways."

Have a comment on this story? Please click "Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message.

Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
AI Is Everywhere, but Don't Ignore the Basics
Howie Xu, Vice President of AI and Machine Learning at Zscaler,  9/10/2019
Fed Kaspersky Ban Made Permanent by New Rules
Dark Reading Staff 9/11/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariConfig.
PUBLISHED: 2019-09-15
In the api-bearer-auth plugin before 20190907 for WordPress, the server parameter is not correctly filtered in the swagger-config.yaml.php file, and it is possible to inject JavaScript code, aka XSS.
PUBLISHED: 2019-09-15
GetSimple CMS v3.3.15 has Persistent Cross-Site Scripting (XSS) in admin/theme-edit.php.
PUBLISHED: 2019-09-15
In Bludit v3.9.2, there is a persistent XSS vulnerability in the Categories -> Add New Category -> Name field. NOTE: this may overlap CVE-2017-16636.
PUBLISHED: 2019-09-15
A Polymorphic Typing issue was discovered in FasterXML jackson-databind before 2.9.10. It is related to com.zaxxer.hikari.HikariDataSource. This is a different vulnerability than CVE-2019-14540.