Currently viewing the category: "Cyber Battle"

So Interpol’s website is down in a possible retaliation as they just picked up 25 suspected Anonymous members.  Or the other reason could be that Interpol simply has a low cap in relation to the amount of attention this story is getting and the story itself is causing the Distributed Denial of Service. That is all part of the fun in Cyberspace; what is the true cause and attribution.

The arrests followed an ongoing investigation begun in mid-February which also led to the seizure of 250 items of IT equipment and mobile phones in searches of 40 premises in 15 cities, Interpol said.

Anonymous recently got attention by secretly recording a conference call between U.S. and British cyber investigators tasked with bringing the group to justice.  But the information within the call was fairly germane.  Part of the overall difficulty beyond compromising a system is actually getting through the minutia and getting the gems within.  If you can’t get the gemstones there is ultimately no end affect.

Anonymous executed this plan well with the Stratfor hack.  Only a few days ago they delivered their ex-filtrated gemstones to Wikileaks for publication.

Rarely do you get to watch a CEO like George Friedman detail the hacking incident and its implications. publicly acknowledge their major failures in the information war component in Cyber Battle against malicous Hackers like Anonymous.

Stratfor’s immediate actions included:

  • Ensured the prompt notification of credit card issuers about the compromised credit cards.
  • Offered all current and former paid subscribers identity protection services from CSID, a leading identity protection company.
  • Commissioned SecTheory, a respected Internet security firm, to work with us to rebuild our website, email system and internal infrastructure.
  • Hired Verizon Business Network Services to conduct a forensic investigation in cooperation with the FBI’s ongoing investigation.
  • Moving our entire e-commerce process to a highly secure, PCI compliant third-party system, which eliminates the need for us to store any credit card information.
  • Enhancing the way we encrypt and store passwords, and implementing new password requirements.

Stay tuned.  I’m sure there is more to follow…

Incoming search terms:

annonamous cyber retaliation
Tagged with:
Set your Twitter account name in your settings to use the TwitterBar Section.