Cascades: the Anonymous Hack of Hbgary (Epilogue)
Total Page:16
File Type:pdf, Size:1020Kb
Case Study | 2016 | RELEASE 1.0 Cascades: The Anonymous Hack of HBGary (Epilogue) OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 1 OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 2 This case study was created as part of the Open Technology Institute’s (OTI) effort to create a curriculum focused on how digital technology is transforming public policy and governance. It is intended for use in a classroom setting. OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 3 CASCADES On Friday, February 4, 2011, The Financial Times The Aftermath reported that Aaron Barr, then the CEO of HBGary In the weeks after the hack, things went from bad Federal, a company that sold IT security services to worse for Barr and his firm. At first, Barr tried to the federal government, had uncovered the to downplay his research on Anonymous; in an names of senior leaders in Anonymous, a interview several days after the attack, he told prominent hacktivist collective.1 With Barr Parmy Olson, a Forbes reporter and Anonymous planning to meet with the FBI on Monday, the expert, that the document the hacktivists had hacktivists swung into action over the weekend, focused on was “an old copy of [his] research” and exploiting a series of weaknesses in the company’s that he merely planned to meet with, not sell IT defenses to gain access to Barr’s e-mails and information to, the FBI.7 But the situation did not company papers (including a document die down. Barr soon canceled his presentation at containing Barr’s research on Anonymous). They the B-Sides security conference, and by mid- also penetrated the HBGary Federal website and February the entire HBGary delegation pulled out accessed the user database for Rootkit.com, a after the company’s booth was vandalized.8 (As website created by HBGary, Inc. founder and CEO Richard Stiennon, the founder of IT-Harvest, an Greg Hoglund.2, 3 Over the weekend, Barr entered IT security analyst firm, and a widely published Anonymous chat rooms in an attempt to defuse author and veteran analyst in the IT security field, the situation; HBGary, Inc.’s President, Penny noted, those booths are extremely expensive.9) Leavy, then attempted the same tact, without success.4 Before long, the hacktivists had posted For his part, Hoglund was trying to stem the online more than 60,000 of HBGary’s e-mails. backlash. As part of that effort, he worked with a The hacktivists also took over Barr’s Twitter team of lawyers to draft a letter, which was sent to account and posted sensitive information, HBGary customers and hinted, as Olson wrote, including his social security and cell phone that the hacktivists “had gone to great lengths” to 10 numbers.5, 6 penetrate the company’s defenses. He also discussed the hack with the press, telling a With the situation spiraling out of control, Barr reporter, “They [the hacktivists] are causing me a and his colleagues were left to wonder if there was great deal of pain right now … What they’re doing anything they could do to salvage the situation. right now is not hacktivism, it’s terrorism. They’ve And as the rest of the world learned of the really crossed a line here.”11 Still, some felt escalating crisis, industry leaders, public policy HBGary Federal might have crossed a line, too: by leaders, and academics started to discuss what, if the end of the month, the company had to deal anything, they could learn from HBGary’s with calls for a Congressional probe into the experience. controversial plans of Team Themis, an alliance among three security firms Barr had established in late 2010 in an attempt to earn a contract with OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 4 Hunton & Williams—a law firm that had several temporarily disabled websites or defaced websites clients (including the U.S. Chamber of Commerce) with a message. The former were often disruptive that reportedly might be interested in HBGary’s but according to Peter Krapp, a professor of film services.12, 13 and media studies at University of California- Irvine, are comparable to a sit in or protest that As the controversy continued to swirl, Barr made it difficult to access a company’s physical 14 announced his resignation. One year later, in late property; similarly, the latter attack was often winter 2012, HBGary, Inc. was acquired by equated with graffiti that tarnished physical ManTech International Corporation, and HBGary property.19 Publishing sensitive documents, a Federal had closed. Hoglund depicted this as a technique that technology security expert Bruce positive development for HBGary, Inc., which had Schneier called “organizational doxing,” pushed actually experienced an increase in sales since the the hacktivists’ behavior into a new, more serious hack had occurred. “This is great news,” he said. domain.20 “We have a billion-dollar company backing us.”15 Nonetheless, another school of thought suggested Nonetheless, even in the HBGary hack, the that the company Anonymous had attacked no hacktivists eventually drew the line, refusing to longer exited as an independent entity. post the social security numbers of any HBGary employees (except Barr) and not releasing any Anonymous and Hacktivism information or images connected to employees’ kids.21 This reinforced the difficulty of casting the Emboldened by the success of their takedown of hacktivists’ actions as purely unethical. As Krapp HBGary, Anonymous—and its offshoots, AntiSec argued, “In my view, the Anonymous hack of and LulzSec—undertook ambitious efforts, HBGary was neither noble…nor simply vindictive including activities connected to the 2012 Occupy or vulgar. It was a reaction to a pointed Wall Street movement and attacks against Sony, provocation.” the U.S. Senate, PBS, and the CIA.16, 17 As Stiennon observed, the Anonymous hack of HBGary However, Joseph Menn, the author of The preceded a “high-water mark” for Anonymous and Financial Times stories on HBGary, argues that it hacktivism more broadly. Nonetheless, is imperative to recognize that, amid all of the Anonymous had to wrestle with challenges, most events surrounding the HBGary hack, the notably continued scrutiny from law enforcement hacktivists were the only ones who had clearly agencies, including arrests of several hacktivists engaged in criminal behavior. He explained via e- 18 connected to the HBGary hack. mail: The HBGary hack—and the increasingly high- Yes, Barr messed up in his hype profile hacks that followed—also intensified the and more importantly in his own debate surrounding the ethics of hacktivism. On security. Yes, security firms often the one hand, by publishing sensitive documents, have stunningly bad security—there the hacktivists seemed to take their actions to have been a rash of much worse another, more dangerous level. In the past, breaches, at RSA, Bit9, VeriSign, etc. Anonymous had often launched DDoS attacks that But the core problems here, to me, are OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 5 that there are criminal and activist being violated, because they are hackers and that the technology we highly targeted. are all saddled with is something very close to indefensible. Yes, Barr The HBGary hack—and similar incidents—also thumbed his nose at the wrong provide government officials an opportunity to people. But he did nothing criminal, think about how they can craft more effective and they did, and the world would be cybersecurity policy. Melissa Hathaway, formerly a worse place if we all avoided doing legal the acting senior director for cyberspace at the things because we were afraid of National Security Council and a cybsersecurity criminals.22 advisor to Presidents George W. Bush and Barack Obama, suggests that future policymakers The Technology Security Industry, maintain several priorities. One is remaining Public Policy, and Individual Security cognizant of the interplay of economic and security issues. New technologies, Hathaway Meanwhile, technology security experts were left emphasized, are often adopted for economic to ponder what they could do differently. One of reasons (e.g., boosting efficiency and productivity the most important takeaways, Stiennon argued or ease of use), with little regard for their security (and one that he actually felt has benefitted the implications. The risk, Hathaway suggested, is field), is that companies that are investigating (or that economic policymakers see “[IT security as] attacking) hacktivists have learned not to publicize somebody else’s job.” But from Hathaway’s point their plans, lest they prompt reprisals like the one of view, those conversations must become that HBGary experienced. Nonetheless, this comes interwoven because adopting new technologies, with another challenge: if companies cannot while potentially beneficial economically, also has market their work, it becomes harder to build a enormous security implications. She elaborated: client base. When IT is embedded in all Another crucial lesson learned is that technology operations, and you’re the person security companies need to bolster their security responsible for delivering the techniques, something which, according to business…you’re responsible for Stiennon, has not happened. He lamented: aligning both the economic of embracing it and the risk management The thing that came out of that of embracing it. And right now those apparently is the lack of good two issue areas are completely security at security vendors. It is separated…[But they are not] apparent that most security vendors separate issues. They are one and the don't heed their own doctrine. same coin, just two different sides [of They just think that they're just like that coin].”23 anybody else. They produce a software or a hardware, sell it, and Similarly, individuals are wrestling with what nobody would attack them. There are events like the HBGary hack means for them. many, many cases of security companies OPEN TECHNOLOGY INSTITUTE | @NEWAMERICA | CASCADES (Epilogue) 6 Some experts argue that it demonstrates the need sphere, we would have lost something for people to be far more circumspect vis-à-vis truly fundamental.