p2pnet view P2P:- Aaron Barr (right) is gone.
But his memory will linger on.
He’s the hapless security expert employed to lead HBGary’s HBGary Federal into prosperity, but who instead led the company into a mire of international embarrassment.
He claimed to have penetrated the inner ranks the Anonymous ungroup, angering supporters who turned the tables on him.
Using social engineering techniques, a 16-year-old Anon gained access to thousands of confidential HBGary files and Anonymous posted them online.
Now Barr says he’s leaving the company.
“I need to focus on taking care of my family and rebuilding my reputation,” Barr tells Threatpost, stating >>>
It’s been a challenge to do that and run a company. And, given that I’ve been the focus of much of bad press, I hope that, by leaving, HBGary and HBGary Federal can get away from some of that. I’m confident they’ll be able to weather this storm.
“They couldn’t have chosen a worse company to pick on”, boasted Greg Hoglund, the front man for disgraced security company HBGary who’d tried to sell the results of Barr’s labours, including names of alleged Anonymous ‘leaders’, to the FBI.
In retribution, Anonymous not only got into HBGary emails, it also posted its entire MySQL database backup online.
The breach also raises troubling questions about the direction that HBGary and other Beltway firms have taken. Email exchanges published online revealed the firm to be at work on a variety of plans to do data mining and information operations on U.S. organizations and journalists on behalf of clients including law firms representing a large U.S. bank and the U.S. Chamber of Commerce.
Most recently, the incident spilled into the mainstream, with comedian Stephen Colbert devoting a segment of his Colbert Report program on February 24 to the HBGary hack.
But now it’s back to bidniz for HBGary which, Hoglund claims, provides “classified services to the Department of Defense, the Intelligence Community and other U.S. Government agencies to meet their unique requirement”.
With Barr on his way out, the company site touts a whole range of gimcracks to entice the US ‘security’ industry, among them “Razor, a stand-alone appliance that automatically detects malicious PDF files, botnets and other stealth espionage at the perimeter using HBGary’s core technology, Digital DNA, the proven, behavior-based method for detecting targeted, non-signature-based malware using physical memory”.
It appears HBGary front man has decided discretion is the better part of valour.
But this is the net, and the net never forgets.
First they ignore you, then they laugh at you, then they fight you, then you win ~ Mahatma Gandhi
World War III will be a global information war with no division between civilian & military participation ~ Marshall McLuhan
Net access blocked by government restrictions? Use Psiphon from the Citizen Lab at the University of Toronto. Go here for details.