Feeds

LMH and InfoSec Sellout unmasked?

Month of Apple Bugs kingpin comes clean

Reducing the cost and complexity of web vulnerability management

The equivalent of a virtual nuke has just been set off in the field of vulnerability research and disclosure. The identities behind two of the noms de guerre that have elicited some of the most heated vitriol over the last 12 months appear to have been disclosed.

In a post to the Fuzzing mailing list, a "Lance M Havok" (LMH) claimed that he was David Maynor, previously known as part of the team that claimed an exploit against OS X wireless drivers at Black Hat, and that InfoSec Sellout was Jon Ramsey, David Maynor's former manager at SecureWorks.

For the uninitiated, LMH was responsible for the Month of Apple Bugs project, including much of the pointed commentary that accompanied each day's release, while InfoSec Sellout has posted commentary that is better hidden behind anonymity - now offline (as well as developing Rape.osx).

At the time of writing, this information has yet to filter to online archives of the mailing lists, but copies can soon be found in the archives of Daily Dave, Full Disclosure, and the Fuzzing mailinglist operated by Gadi Evron.

InfoSec Sellout has previously stated that David Maynor is looking in the wrong direction in his attempts to unmask the identity behind the name, but there is no comment yet on the latest claim being released.

The decision to unmask apparently came after some third parties appeared to be on the right track towards uncovering the identities behind the names. If true, it could mean that the unmask.py tool written by Dave Aitel is mature enough to be of great use in tracking and identifying the movements and posts of otherwise anonymous internet posters.

Analysis of the message shows it originating from a Google GMail session, but beyond that little other information is available. Time will show whether the people named in the email step forward to corroborate the claims being made.

It is expected that more information will come to light over the next couple of days which should settle the issue about these latest identity claims.

This article originally appeared at Sûnnet Beskerming

© 2007 Sûnnet Beskerming Pty. Ltd

Sûnnet Beskerming is an independent Information Security firm operating from the antipodes. Specialising in the gap between threat emergence and vendor response, Sûnnet Beskerming provides global reach with a local touch.

Remote control for virtualized desktops

More from The Register

next story
Nothing illegal to see here: Tribunal says TEMPORA spying is OK
Rules mass surveillance is legal, in principle at least
Google kills CAPTCHAs: Are we human or are we spammer?
Do you make up these questions, Mr Wonka?
'We're having panic attacks' ... Sony staff and families now threatened in emails
Join us or else say messages purportedly from GOP hackers
Author fined $500k in first US spyware conviction
100,000 creeps buy mobe-watching wares
Snowden files show NSA's AURORAGOLD pwned 70% of world's mobe networks
Brits and Yanks snoop on security standards bods
Sony Pictures struggles as staff details, salaries and films leaked
Fury and Annie now doing the rounds - along with staff's privates
Stupid humans and their EXPENSIVE DATA BREACHES
Non-human cockups only account for 7% of leaks
Australian Government funds effort to secure wearable data pulses
Skipping hand-in-hand with government and insurance company databases
prev story

Whitepapers

Three businesses share why they chose Citrix XenDesktop over VMware View
Delivering Windows apps and desktops as secure mobile services from a cloud-ready platform while simplifying management, reducing costs and enhancing security.
Focus on 5 SIEM requirements
In order for SIEM to help usher in more effective security and risk management strategies—particularly as they relate to threat mitigation, embracing trends, and aligning with business priorities—these five issues must be solved.
The Escalating Threat of DDoS Attacks
With increasing frequency and scale, some of the world’s largest data center and network operators are suffering from crippling Distributed Denial of Service (DDoS) attacks.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mobile, multilingual, and content authoring
The major changes in Drupal 8 for end users, site builders, designers and front-end developers, and for back-end developers - part 1.