DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

STRATFOR Emails Hijacked After Anonymous Leak

Posted on January 7, 2012 by Lee J

It would seem that STRATFOR has been taken for fools again, this time some one has hijacked the official email message and started sending it out to the exposed clients list. Now its really no need to explain who and what has happened to them over the past weeks so lets just move on. Now really anyone could of seen this coming, it was just a matter of time. In response to the emails STRATFOR has released [another updated](I got that e-mail, but it was in my spam folder so I trusted gmail… the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number…so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you’ll be up and running very fast. Best Wishes 🙂 Milena) via its facebook page and a video to confirm this update, bit overkill if you ask me but hey i guess they have hundreds of thousands of people watching them now so they have to be on top of things, even if they do get made out to be fools so often. Reports on CNN have bits of the email that has been getting sent out One of the comments on the recent release note state the following:

I got that e-mail, but it was in my spam folder so I trusted gmail… the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number…so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you’ll be up and running very fast. Best Wishes 🙂 ******

Another comment on the profile page makes a slight attack towards them with some very good points they might want to pay attention to.

George (or any other Stratfor VP) since emails to [email protected] still bounce please comment on: 1. What steps you are taking to ensure all your ‘members’ data is secure when you re-launch and you won’t repeat the same mistakes again. Have you said sorry yet and explained why data was unencrypted? 2. What steps you are doing to ensure recipients of your emails can validate they are legitimate and not spoofed or worse still – doctor’ed documents (with malicious content, or cleverly manipulated situations reports). I do wonder what someone could do by secretly and slowing manipulating your situational reports over say 6 months? So far I have not seen anything that suggests you deserve my trust You know, I even read Fred Burtons book and he himself makes reference to years worth of intelligence lost once a CIA station chief (If I recall correctly) was lost – isn’t this the same situation – how many of your ‘sources’ now trust you to speak in confidence without fear they will be compromised next time Anonymous comes knocking on your email server?

Video from STRATFOR And the message that STRATFOR has released.

Dear readers, While addressing matters related to the breach of Stratfor’s data systems, the company has been made aware of false and misleading communications that have circulated within recent days. Specifically, there is a fraudulent email that appears to come from George.Friedman[at]Stratfor.com. I want to assure everyone that this is not my email address and that any communication from this address is not from me. I also want to assure everyone that Stratfor would never ask customers and friends to provide personal information through the type of attachment that was part of the email at issue. This email, and all similar ones, are false and attempt to prey on the privacy concerns of customers and friends. We strongly discourage you from opening such attachments. We deeply regret the inconvenience this latest development has created. While Stratfor works to reestablish its data systems and web presence, we ask everyone to please look for official communications, such as this one, and to monitor the Stratfor Facebook page and Twitter feed for company-approved communications. Thank you for your patience. Please direct any questions and concerns to [email protected]. Sincerely, George Friedman To verify the validity of this communication from Stratfor, please view this video of our VP of Intelligence, Fred Burton, which references and authenticates this post.

For more on the STRATFOR hacks check here

Category: Breach Incidents

Post navigation

← Israeli Server Hacks, More Attacks to Come. Another 11k CC’s Released
SRA International Awarded $60 Million Single-Award Contract from National Institutes of Health →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.