Feeds

'Meltdown Monday' Anonymous hackers leak military mails

AntiSec hacktivists blasted for breaking own manifesto

Internet Security Threat Report 2014

Anonymous uploaded 90,000 military email address and associated password hashes onto a file-sharing network on Monday as part of an operation it christening Military Meltdown Monday.

The sensitive data came from a hack against military contractor Booz Allen Hamilton, which Anonymous hinted had yielded further sensitive information. The loosely knit hacktivist collective claims to have pulled the information from an unprotected server.

As a result, email addresses on the list are at a greater risk at being at the targeted end of malware attacks, at least. It's a fair bet that many of the passwords used will have been less than super-secure and therefore open to brute-force dictionary-based attacks against the exposed accounts. Other data obtained, but not released, might be used to mount other attacks, security watchers warn.

"Anonymous claims to have erased four gigabytes worth of source code and to have discovered information which could help them attack US government and other contractors' systems," Chester Wisniewski of net security firm Sophos notes in a blog post on the hack.

Booz Allen Hamilton declined to comment on the incident, AFP reports.

The reported hack against Booz Allen Hamilton and an earlier hit against government contractor IRC Federal are part of the umbrella AntiSec movement, which aims to expose the poor security of government agencies and big corporates. This point, such as it is, has been made long ago with attacks on Sony, HBGary and others, so at this point in the game the attacks needlessly expose military personnel, Arizona police officers or gamers to greater risk of internet attack.

Rik Ferguson, a security consultant at Trend Micro, said that the AntiSec banner is being used as a flag of convenience for all sorts of mischief by people who are seemingly unfamiliar with the origin of the term. He writes:

In the ultimate irony, the original AntiSec manifesto from back in 2001 was all about the irresponsibility of full disclosure. That same manifesto was re-posted when Imageshack was compromised eight years later. The manifesto criticised the 'security industry' for using full-disclosure to develop 'scare tactics' to convince people into by security. Are you listening, Operation AntiSec?

Find the flaws, publish your successes if you must, but have the decency to spare the innocent victims of your activities. Obscure personal data before you publish; otherwise you are considerably worse than those you are attempting to shame.

Which seems to sum it up. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.