By Nicole Henderson, July 12, 2011
A tweet by Booz Allen explains its lack of response to the incident
(WEB HOST INDUSTRY REVIEW) -- Hacker group Anonymous has taken responsibility for releasing 90,000 military email and passwords after a breach at consulting firm Booz Allen Hamilton (http://www.boozallen.com/) on Monday.
This hack comes less than a week after Anonymous hacked several websites belonging to the Turkish government.
"Today we want to turn our attention to Booz Allen Hamilton, whose core business is contractual work completed on behalf of the US federal government, foremost on defense and homeland security matters, and limited engagements of foreign governments specific to US military assistance programs," Anonymous said in a statement.
According to the Financial Times, a Pentagon official said on Tuesday that it is looking into the incident despite having no "concrete information" about the hack.
Anonymous claims it was able to infiltrate a server on Booz Allen's network "that basically had no security measures in place."
Booz Allen has yet to make a comment, though it has tweeted that its security policy is to not comment on specific threats or actions taken against its systems.
When LulzSec was in its prime this spring, Anonymous attacks seemed to take the back burner. Now, since LulzSec retired at the end of last month, it appears Anonymous is back in full force. While LulzSec claimed to hack for fun, Anonymous is upfront about its political motivations which it has dubbed hacktivism.
The AntiSec movement, started by LulzSec, embarrasses large corporations and government organizations.As a consultant to the US government, one would think that Booz Allen would have a secure IT system in place to prevent these type of breaches. A report by Wired's Threat Level blog says it is the 16th largest recipient of federal contractor spending.
Article Source http://www.thewhir.com/web-hosting-news/071211_Hacker_Group_Anonymous_Releases_90000_Email_and_Passwords_of_Military_Personnel permits to republish here.
This hack comes less than a week after Anonymous hacked several websites belonging to the Turkish government.
The attack was part of what the group deemed Military Meltdown Monday and is part of the larger AntiSec movement targeting government organizations and corporations.
"Today we want to turn our attention to Booz Allen Hamilton, whose core business is contractual work completed on behalf of the US federal government, foremost on defense and homeland security matters, and limited engagements of foreign governments specific to US military assistance programs," Anonymous said in a statement.
According to the Financial Times, a Pentagon official said on Tuesday that it is looking into the incident despite having no "concrete information" about the hack.
Anonymous claims it was able to infiltrate a server on Booz Allen's network "that basically had no security measures in place."
Booz Allen has yet to make a comment, though it has tweeted that its security policy is to not comment on specific threats or actions taken against its systems.
When LulzSec was in its prime this spring, Anonymous attacks seemed to take the back burner. Now, since LulzSec retired at the end of last month, it appears Anonymous is back in full force. While LulzSec claimed to hack for fun, Anonymous is upfront about its political motivations which it has dubbed hacktivism.
The AntiSec movement, started by LulzSec, embarrasses large corporations and government organizations.As a consultant to the US government, one would think that Booz Allen would have a secure IT system in place to prevent these type of breaches. A report by Wired's Threat Level blog says it is the 16th largest recipient of federal contractor spending.
Article Source http://www.thewhir.com/web-hosting-news/071211_Hacker_Group_Anonymous_Releases_90000_Email_and_Passwords_of_Military_Personnel permits to republish here.
<<<<<<<<<<<<<
Click Most Updated Discount Coupon Codes & My Personal Web Hosting Recommendations
Click http://nightwishmarketing.web.officelive.com/WebHosting.aspx
Stay Tuned!
Click http://nightwishmarketing.web.officelive.com/WebHosting.aspx
Stay Tuned!
<<<<<<<<<<<<