HBGary Federal hacked and exposed by Anonymous

Discussion in 'other security issues & news' started by lotuseclat79, Feb 7, 2011.

Thread Status:
Not open for further replies.
  1. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
    HBGary Federal hacked and exposed by Anonymous.

    This is interesting since the principal of HPGary,
    In addition, you will see his work on the website rootkit.com.

    -- Tom
     
  2. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  3. lotuseclat79

    lotuseclat79 Registered Member

    Joined:
    Jun 16, 2005
    Posts:
    5,390
  4. J_L

    J_L Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    8,738
  5. Pedro

    Pedro Registered Member

    Joined:
    Nov 2, 2006
    Posts:
    3,502
    lotuseclat79 thank you for posting this.
    I don't even know what to say, and reading the irc log .. wow
     
  6. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From HBGary Emails A Sweet Valentine For Social Engineers:
     
  7. Baserk

    Baserk Registered Member

    Joined:
    Apr 14, 2008
    Posts:
    1,321
    Location:
    AmstelodamUM
    As pointed out by Heise Online in their article today on HBGary et al,
    the whole shebang can easily be read on httpxxxhbgary.anonleaks.ru/greg_hbgary_com

    Heise Online article; httpxxxwww.h-online.com/security/news/item/Anonymous-exposes-US-security-company-1189973.html

    The perfect ~ Snipped as per TOS ~ storm?
     
    Last edited by a moderator: Feb 15, 2011
  8. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
    From Anonymous exposes US security company:
     
  9. trismegistos

    trismegistos Registered Member

    Joined:
    Jan 29, 2009
    Posts:
    363
  10. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Found some VERY interesting reading in these :eek:

    We know nothing about Stuxnet, Oh really :D

    And this

    So it's confirmed, the .GOV etc are involved in creating malware and planting it etc ;)

    -http://crowdleaks.org/hbgary-wanted-to-suppress-stuxnet-research
     
  11. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    Woooooaaah, interesting read MAN!

    Holy crap insane story :D
     
  12. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  13. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    Extracts from the PSYOPS Response.doc My BOLDING

    More good reasonS to stay clear of social media ;)

    Also on the same page is this !

    Stuxnet
    ZIP/stuxnet.zi_

    No password for it though :( So it's safe :p
     
  14. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  15. trismegistos

    trismegistos Registered Member

    Joined:
    Jan 29, 2009
    Posts:
    363
    Last edited: Feb 19, 2011
  16. kareldjag

    kareldjag Registered Member

    Joined:
    Nov 13, 2004
    Posts:
    622
    Location:
    PARIS AND ITS SUBURBS
    Hi,

    "Once upon a time in the security industry", or "the good, the bad and the ugly"? Funny...my opinion is summarized on this french article:
    http://translate.google.fr/translat...-acslaw-et-hbgary-2/&sl=fr&tl=en&hl=&ie=UTF-8

    Regarding the Magenta rootkit:
    http://www.scribd.com/doc/48981331/Magenta-HBGray-rootkit

    It is here pure buzz and pretentious advertising.
    Yes it is possible to make live memory examination more difficult (already summarized by Johanna R. 3 years ago), but in a minnor way only (and on which processor if we consider virtualization memory protection).
    Also: "Any physical memory based tools that would allow you to see the current location of Magenta body would only be of limited use..", well in this cas i suggest to HBGary to stop advertising ansd selling their own tools:
    http://www.evidencemagazine.com/index.php?option=com_content&task=view&id=116&Itemid=49

    All version of Windows? in this case a simple "write prtection" available on XP/Vista/7 will be enough to prevent this rootkit.
    I'd rather personnaly the ethical way of Dave Aitel (http://en.wikipedia.org/wiki/Dave_Aitel ) who has founded his campany after working years at the NSA.
    Anyway...we live in a wonderfull world...

    Rgds
     
  17. Meriadoc

    Meriadoc Registered Member

    Joined:
    Mar 28, 2006
    Posts:
    2,642
    Location:
    Cymru
    Some nice things coming out ;)

    ayb
     
    Last edited: Feb 19, 2011
  18. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    MrBrian/trismegistos/lotuseclat79

    Thanks for the links :thumb:

    In one of them it mentions 12 monkeys rootkit which i hadn't heard of before :eek:

    Greg Hoglund i sort of have some sympathy for, as from what i've read/seen over the years, he was/is a talented coder. Starting up and running and contributing to rootkit.com for many years, he cleverly absorbed ideas etc posted on there, amongst other places, and fused them into "better" things along with his own ideas/code. In latter times he hardly ever posted anymore, that's because by now he had moved on = gone "straight" = corporate/government etc !

    He saw opportunities = $ and was one of the first to do so. Nothing wrong with that though as such. I have a feeling that as he wasn't a typical "suit" guy he felt he needed someone who was, and that could probably interface/BS more directly with suit/.Gov etc types :p The person chosen to front HBGary Federal was Aaron Barr. As he and others in HBGary have now found out to their COST and shame, it was a Very bad move, and one i'm sure he and the others now regret BIG time.

    Of course Greg Hoglund and others in HBGary aren't completely innocent in All the shananagins we are now learning about, but it was Mr. Ego = Aaron Barr who stabbed himself, and all the others in the foot with his foolish behaviour. But if it hadn't been for him we would be none the wiser ;)
     
  19. Noob

    Noob Registered Member

    Joined:
    Nov 6, 2009
    Posts:
    6,491
    LOL, so true.
    He went to the limits to demonstrate his capabilities (Stalking customers to show his skills etc.), over confidence leads to problems :D
     
  20. Serapis

    Serapis Registered Member

    Joined:
    Nov 15, 2009
    Posts:
    241
    Hi Kareldjag, what is this write protection that you speak of? How can I enable it?
     
  21. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
  22. Searching_ _ _

    Searching_ _ _ Registered Member

    Joined:
    Jan 2, 2008
    Posts:
    1,988
    Location:
    iAnywhere
    This is like General Hospital or Days of Our Lives, but for Hackers/Crackers.
    popcorn.gif
    Does that mean Greg Hogland = Susan Lucci?
     
  23. trismegistos

    trismegistos Registered Member

    Joined:
    Jan 29, 2009
    Posts:
    363
    @CloneRanger:
    I resonate with your insights. :)

    You might be interested to read HBGary's report on China Cyber espionage...
    -http://cryptome.org/0003/hbg/HGB-CN-Spy.zip

    -http://cryptome.org/0003/hbg/HBG-PMF-CI.zip
     
  24. CloneRanger

    CloneRanger Registered Member

    Joined:
    Jan 4, 2006
    Posts:
    4,978
    ;)

    Thanks for the PDF links :thumb: Had a quick scan through the Chinese one :eek:

    Yes SCADA, As in Stuxnet ! But Greg Hoglund states that the Slammer worm also got in :eek: Didn't know that before !
     
  25. MrBrian

    MrBrian Registered Member

    Joined:
    Feb 24, 2008
    Posts:
    6,032
    Location:
    USA
Thread Status:
Not open for further replies.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.