STRATFOR, “still in the process of securing our website” After Anonymous Hack

STRATFOR LogoSTRATFOR, the intelligence company that got shamed and loads of data leaked that has had a running effect on many different people, has made prime time TV news and got a lot of governments of the world worried and concerned about it has release yet again another statement on its facebook profile. The statement which goes on to say "We are still in the process of securing our website, but in the meantime, we’re continuing to do what we’ve always done — gather intel and produce geopolitical analyses, which we will begin publishing again as soon as we can do so securely." has some very valid and interesting comments attached to it. One of these comments being the effect its had on a person that was in the data leak, "This hack has been a real headache! I had to cancel all of my credit cards and several online accounts — all while traveling overseas for the holidays…I certainly hope it doesn’t happen again…". So yeah as you can see STRATFOR clients are still pissed at them for not encrypting the data which also has been brought up by a few commenter’s who are concerned with this. When the STRATFOR website goes back online and it gets back to doing what it does, i expect us to see a full analysis of the hack and all the trouble its caused for them over the past weeks. In another posting made by them shortly after they have been getting what they called "trolled" with comments being made "Expect US" with response’s to it like "You hacked a harmless paid subscription service, you twit. What do you think you accomplished?" One thing is for sure when they do come back online i would guess by then they would of increased security and monitoring of its servers a great deal, but as some of the comments state, it wont ever stop hackers they always find a new back-door, its just a matter of time. You can follow all of STRATFOR’s information release’s via the facebook page, Also here and here are the 2 latest comments by STRATFOR.

About the author: Lee J

Security Analyst, Developer, OSINT,

Comments are closed.