Feeds

Anonymous hacks US gov contractor, airs dirty laundry

Uses Mantech to wreak revenge on FBI

SANS - Survey on application security programs

Members of the Anonymous hacking collective said they broke into the networks of Mantech International and stole internal documents belonging to the US government contractor.

As proof, the members posted a 390 MB download that appeared to contain reports related to NATO, the US Army and personnel files. A note that accompanied the Bittorrent file said the hack was intended to defy the FBI, which last week charged 14 people of participating in an Anonymous-led web attack in December that created service disruptions for some PayPal customers.

“Dear Government and Law Enforcement, we are repeating this message as we have the suspicion you still do not take us seriously,” their 715-word screed, which was titled “FUCK FBI FRIDAY,” read in part. “We are not scared anymore and your threats to arrest us are meaningless. We will continue to demonstrate how you fail at about every aspect of cybersecurity while burning hundreds of millions of dollars that you do not even have.”

The leaked documents appeared to have little or no connection to the FBI, although press releases appeared to show that the FBI has outsourced some of its IT security to Mantech. The Washington, DC-based firm has also signed contracts to provide services to the departments of Defense, State, Homeland Security, Energy and Justice.

A statement posted to Mantech's homepage said the company “takes seriously recent reports of a cyber threat, and we responsibly and actively address all sources of information about threats to our information and assets and those of our customers.” It neither confirmed nor denied the Anonymous claims Mantech was compromised “utterly and throughly” [sic].

The document dump comes after Anonymous and its Lulz Security offshoot have claimed responsibility for brazen attacks on the US CIA, the US Senate, and various Arizona law enforcement agencies, among many others.

The document dump came a few days after UK police claimed they arrested a central LulzSec figure. On Friday, investigators with Scotland Yard received an extension giving them three more days to detain the 18-year-old they say was the figure known as Topiary. The extension cast doubt on speculation the unidentified man was a fall guy who was framed to take the heat off the real culprit. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Snowden-inspired crypto-email service Lavaboom launches
German service pays tribute to Lavabit
Mounties always get their man: Heartbleed 'hacker', 19, CUFFED
Canadian teen accused of raiding tax computers using OpenSSL bug
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.