Donate for the Cryptome archive of 65.000 files from June 1996 to the present

30 December 2011. Also, by JYA: http://cryptome.org/0006/anonymous-wabc.htm

27 December 2011. Not by JYA.

Anonymous Mused


A sends:

The recent attack on Stratfor [1][2][3] brings to light some questions that can not be ignored. As we all well know, Anonymous has taken credit [4] for this attack. With events such as this it is very possible that there are goings-on behind the scenes that need to be taken into account.

Lets start with Anonymous' [5], and it's sub-organization #antisec [6], as a whole. Anonymous fancies itself as some sort of hacktivist organization fighting for the greater good of all mankind. In reality it is nothing more than a name that different groups can hide behind in order to leak/drop information and attach itself to the Anonymous "brand" or rather, it's PR infrastructure. For example, there are various Twitter accounts [7][8] and IRC servers [9] that serve as the main conduit for news and information related to recent Anonymous activity. Not only is Anonymous very good at PR, they piggy-back off of preexisting movements in order to gain attention and new members. For example, the "antisec" or "pr0j3kt m4yh3m" movement was not started by Anonymous, rather multiple groups started some years ago created this movement [10][11]. Anonymous has adopted it as their own after the movement slowed down due to various reasons (group members growing older and getting a job, getting arrested [12], drug overdoses, etc).

In earlier times, these groups would leak/hack/drop this information under their own name and release it in various "e-zines" [13][14][15] that were then passed around to other "underground" groups and hackers. Most of these groups found over the years that this system accomplished nothing but painting a target on themselves and their group. Victims of these groups would have a name behind who was responsible and would, if the right skills were had, be able to retaliate in a somewhat effective manner.

This is now why you see a sudden ramp up of hacks/leaks under the name of Anonymous. These groups realized that by using the Anonymous name they could effectively use other Anonymous members as a "human" shield and have some plausible deniability. Eventually, these groups realized that by leaking their hacks/information to the Anonymous "group" #antisec, they could easily hide and use the PR boost as an advantage. In essence, someone will hack a website (Sony, PBS, HBGarry, Police Websites) and then give the information and access to Anonymous groups to do what they please. These groups will then analyze this information and leak it in order to maximize damage. There are also times when Anonymous "leaders" will ask others to "donate" 0-day exploits [16] to them so they can use them how they please [17].

It does not take a brilliant mind to think of ways this system can be exploited. Some of Anonymous' targets have been government agencies [18] and corporations [19]. Organizations that have enemies and competitors that are extremely determined. If any of those enemies were to attack their competitor they would not have any good way of leaking that information without outing themselves as the culprit. This is where Anonymous comes in. Using Anonymous, anyone can hack/leak/and delete corporate or government secrets and make it look like it was the "hacktivists" that did it. Thus, diverting blame from themselves and onto, largely, unsuspecting groups of people who flock to the Anonymous "ideals." These people, or scapegoats rather, are the ones that read about these Anonymous "hacks" and decide to join in by connecting to their IRC servers and launching DDoS attacks on Anonymous targets [20][21]. They are the ones who are eventually caught, leaving the real (and more skilled/intelligent) culprits in the dark behind the Anonymous shadow.

Now lets talk a little about the recent events surrounding Stratfor [22]. As you have read in the news, hackers managed to download roughly 200GB worth of company emails, various IT support tickets, and the complete (90K strong) customer database including credit card information . Not only did the hackers acquire this information, once they were done downloading it all they deleted the backups [23], effectively putting Stratfor out of business for the time being. Many people [24] are left wondering why Anonymous has targeted such a company. Stratfor worked by providing news analysis to subscribers via email and their website and used mainly OSINT [25] to accomplish this. Their subscribers are made up of a multitude of organizations and people including: Police, Schools, Intelligence Services, Journalists, and international affairs aficionados. So this attack raises some eyebrows when it comes from the Anonymous name since the Anonymous name was at first established by those seeking to provide transparency and fight for first amendment rights in other countries.

It may be that a group of Anonymous has just picked the "low hanging fruit," but it seems that if someone really wanted to stick it to a private intelligence firm that worked with/for the government they would have gone after more shady intelligence companies such as GK Sierra [26], Aegis [27], GPW [28], or Hakluyt [29].

This then leaves the imagination to wander. Was the Stratfor hack the work of a competitor? Foreign Intelligence Service? Or was it really just a group that has been working under the Anonymous name in the past? I guess the question will take someone more "in the know" than me to answer.

[1] http://www.csmonitor.com/USA/2011/1226/Intelligence-firm-Stratfor-reels-after-data-breach.-
What-did-hackers-get

[2] http://edition.cnn.com/2011/12/25/us/stratfor-hacking/

[3] http://www.zone-h.org/mirror/id/16416728

[4] http://pastebin.com/q5kXd7Fd

[5] http://en.wikipedia.org/wiki/Anonymous_%28group%29

[6] http://en.wikipedia.org/wiki/Operation_AntiSec

[7] http://twitter.com/anonymouSabu

[8] http://twitter.com/#!/AnonymousIRC

[9] http://anonops.com

[10] http://en.wikipedia.org/wiki/Antisec_Movement

[11] http://lucifer.phiral.net/pHc/old/

[12] http://www.soldierx.com/hdb/Unix-Terrorist-Jim-Jones-theut-zmagic-yu0

[13] http://gonullyourself.org/ezines/el8/

[14] http://gonullyourself.org/ezines/h0no/

[15] http://gonullyourself.org/ezines/ZF0/

[16] http://en.wikipedia.org/wiki/Zero-day_attack

[17] http://twitter.com/#!/anonymouSabu/status/151055716902379520

[18] http://www.globalpost.com/dispatches/globalpost-blogs/weird-wide-web/anonymous-syria-
defense-website-hack

[19] http://www.wired.com/threatlevel/2011/02/anonymous-hacks-hbgary/

[20] http://thehackernews.com/2011/10/anonymous-ddos-oakland-police-site.html

[21] http://news.cnet.com/8301-31001_3-20022264-261.html

[22] http://en.wikipedia.org/wiki/Stratfor

[23] http://pastebin.com/UvKz3T1r

[24] http://www.reddit.com/r/politics/comments/nq5zj/hackers_on_sunday_25_december_
2011_claimed_to/

[25] http://en.wikipedia.org/wiki/Open-source_intelligence

[26] http://en.wikipedia.org/wiki/GK_Sierra

[27] http://en.wikipedia.org/wiki/Aegis_Defence_Services

[28] http://www.gpwltd.com

[29] http://en.wikipedia.org/wiki/Hakluyt_%26_Company