Anonymous attack didn’t harm HBGary Federal’s business, says CEO

When HBGary Federal, had its website hacked and sensitive e-mail exposed by hacktivist group Anonymous last February, it became a question of how Sacramento, California-based security firm HBGary could survive the damage to its reputation.

In spite of the bruising, HBGary not only didn’t lose business customers in the course of the past year, but “we ended up getting additional business,” claimed Greg Hoglund, founder and CEO of HBGary.

Calling it an unexpected and even “weird side effect,” Hoglund said the widely-publicised attack by Anonymous on HBGary Federal, a separate company set up by HBGary in 2009 to market to the federal government, appears to have elicited a sense of identification from many other companies. “They saw us go through things they were experiencing,” he says.

Last February, members of Anonymous, apparently furious that then-CEO of HBGary Federal, Aaron Barr, had publicly alluded to his effort to infiltrate the hacktivist group to expose its leaders, lashed out by breaking into the HBGary Federal website. Anonymous then seized tens of thousands of the firm’s email to post them online. The dark episode even had HBGary President Penny Leavy, Hoglund’s wife, going onto an Anonymous IRC channel to basically beg for the attack to end.

Proposals to undermine critics

Some of the seized email included email from Barr to a Bank of America law firm proposing a way to marginalise WikiLeaks, the group that in the past has published confidential corporate and government documents it secretly obtains, by hacking into it and feeding it fake documents.

However, the bigger scandal in the hacked email bundle was associated with comments made about possibly “disrupting” Glenn Greenwald, a Salon columnist who has been sympathetic to WikiLeaks, as well as a proposal to undermine US Chamber Watch, a critic of the US Chamber of Commerce. The scandal forced Barr to resign from HBGary Federal and when Barr wanted to discuss his experiences chasing after Anonymous in a session scheduled at the Defcon Conference in July this year, HBGary Federal said it would seek an injunction against him if he did.

HBGary was reluctant to say much about HBGary Federal. Ted Vera, COO of HBGary Federal, did not respond to a Network World inquiry to discuss its current situation either. A very long trail of inter-office e-mail correspondence between executives of HBGary and HBGary Federal even now litters the Internet, laying bare their thoughts up until that moment in February when the attack began. But today, Hoglund barely seems to want to acknowledge HBGary Federal anymore, even after having licensed his company name to it.

Hoglund waves off references to HBGary Federal and the email as not consequential to HBGary itself in terms of being attacked. “We shared an email service, Google, with HBGary Federal,” Hoglund says. “Anonymous never came within 2 to 3 network layers of us.”

Multi-factor authentication is crucial

The devastating attack on HBGary Federal, Hoglund says, has convinced him that “you must use multi-factor authentication in every portal in your enterprise.”

Directly after the Anonymous attack on HBGary Federal, vandals tore up HBGary’s booth at the RSA Conference 2011 last February, and Barr also cancelled a presentation he was scheduled to give at another conference at that time running adjacent to RSA, saying he was getting death threats.

The investigation by law enforcement into the HBGary Federal incident is said to be ongoing. But Hoglund says he’ll be at the RSA Conference 2012 in February, speaking on the topic “Modern Cyberthreats: The Changing Face Behind the Keyboard.” He says his talk will be about advanced persistent threats, which are stealthy attacks to seize important data, and “all the things I learned about APT threats this year.”

Article source: http://rss.feedsportal.com/c/270/f/3551/s/1adee775/l/0Lnews0Btechworld0N0Csecurity0C33243970Canonymous0Eattack0Edidnt0Eharm0Ehbgary0Efederals0Ebusiness0Esays0Eceo0C0Dolo0Frss/story01.htm

View full post on National Cyber Security » Computer Hacking