Wednesday, February 09, 2011

Meanwhile, as long as the Internet is still up ...

... this story is a nice antidote to the doom and gloom of the previous post.

It seems that a company called HBGary Federal, "which does classified work for the U.S. federal government among other security work," made a big noise about being hot on the trail of the "real identities of top members of Anonymous," whereupon they were promptly pwned by Anonymous.



Among other things, Anonymous:

... seized control of the internet security firm's website, defaced its pages, acquired 60,000 company e-mails, deleted backup files, seized [HBGary Federal employee Aaron] Barr's Twitter account, and took down the founder's website rootkit.com. Anonymous also acquired this document, which HBGary was set to provide to the FBI at a scheduled meeting tomorrow.

Just another reminder that those who promise to deliver security and protect liberty often fail at both.

(pic. source)

[Added] Nate Anderson at Ars Technica has a long post detailing the unraveling. And a follow-up.

[Added2] Some disturbing revelations come to light.

No comments:

ShareThis