Hackers released more data obtained from a breach of Stratfor, including e-mail addresses and credit card numbers, the geopolitical intelligence firm confirmed to CNET today.
In a post on Pastebin by someone using the "AntiSec" moniker, there are links to downloads of data on different sites, some of which were removed by midday today. The data dump follows the release of a list of Stratfor (Strategic Forecasting) clients on December 25 and a warning from hackers that they had more sensitive data to release, including unencrypted credit card data.
"It's time to dump the full 75,000 names, addresses, CCs and md5 hashed passwords to every customer that has ever paid Stratfor. But that's not all: we're also dumping ~860,000 usernames, email addresses, and md5 hashed passwords for everyone who's ever registered on Stratfor's site," the post says, adding that 50,000 of the e-mail addresses end in .mil or .gov domains.
"We almost have sympathy for those poor DHS employees and australian billionaires who had their bank accounts looted by the lulz ... But what did you expect?" the post says. "All our lives we have been robbed blindly and brutalized by corrupted politicians, establishmentarians and government agencies sex shops, and now it's time to take it back."
The post then goes on to warn that hackers will attack "multiple law enforcement targets from coast to coast" on New Year's Eve and that there will be "noise demonstrations" outside of jails and prisons around the world in solidarity with the prisoners.
"Stratfor regrets the latest disclosure of information obtained illegally from the company's data systems," the company said in a statement. "We want to assure our customers and friendsthis was not a new cyberattack, but was instead a release of information obtained during the previous security breach. The latest disclosure included credit card information of paid subscribers and many e-mail addresses of those who receive Stratfor's free services."
Asked to comment on the timing of the breach and why the company was not using encryption, Stratfor provided this statement: "We don't have any information on that at the moment. But I want to assure you Stratfor is working with law enforcement to investigate the cyberattacks and will release results soon. In the meantime, we will be providing periodic updates on our response to the attacks."
Meanwhile,the company is offering to pay for a one-year subscription to identity protection services for anyone affected by the breach. The corporate Web site will not be back up for another week or so, Stratfor CEO George Friedman wrote in a post on the company's Facebook page that was also sent to subscribers via e-mail.
"To say we wish this hadn't happened is a massive understatement," he wrote. "As I have stated in prior emails to you, I sincerely apologize for these unfortunate events. Our investigation and coordination with law enforcement is ongoing, and we will continue to update you as more details become available."
On Thursday, the hackers said they had breached the Web site of SpecialForces.com and claimed to have 14,000 passwords and data on 8,000 credit cards, although the data was encrypted. The hackers also claim to have copies of as many as 2.7 million Stratfor e-mails that they plan to release.
AntiSec, which is a coalition of members of the de-centralized Anonymous group of hactivists and the more mischievous LulzSec offshoot, claimed credit for attacks earlier this year on police, sheriffs and other law enforcement agencies in the U.S. and Italy, defense and government contractors including Booz Allen Hamilton and HBGary Federal, and government agencies in Chile, Zimbabwe, and Brazil.
Stratfor may have hit the hackers' radar when it warned members of Anonymous in November not to wage war on the Zetas drug cartel in retaliation for the alleged kidnapping of an Anonymous member. "As Mexican cartels have targeted online journalists and bloggers in the past, hackers could well be targeted for reprisal attacks," Stratfor wrote in a report on OpCartel.