... this story is a nice antidote to the doom and gloom of the previous post.
It seems that a company called HBGary Federal, "which does classified work for the U.S. federal government among other security work," made a big noise about being hot on the trail of the "real identities of top members of Anonymous," whereupon they were promptly pwned by Anonymous.
Among other things, Anonymous:
... seized control of the internet security firm's website, defaced its pages, acquired 60,000 company e-mails, deleted backup files, seized [HBGary Federal employee Aaron] Barr's Twitter account, and took down the founder's website rootkit.com. Anonymous also acquired this document, which HBGary was set to provide to the FBI at a scheduled meeting tomorrow.
Just another reminder that those who promise to deliver security and protect liberty often fail at both.
[Added] Nate Anderson at Ars Technica has a long post detailing the unraveling. And a follow-up.
[Added2] Some disturbing revelations come to light.
No comments:
Post a Comment