DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

STRATFOR Emails Hijacked After Anonymous Leak

Posted on January 7, 2012 by Lee J

It would seem that STRATFOR has been taken for fools again, this time some one has hijacked the official email message and started sending it out to the exposed clients list. Now its really no need to explain who and what has happened to them over the past weeks so lets just move on. Now really anyone could of seen this coming, it was just a matter of time. In response to the emails STRATFOR has released [another updated](I got that e-mail, but it was in my spam folder so I trusted gmail… the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number…so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you’ll be up and running very fast. Best Wishes 🙂 Milena) via its facebook page and a video to confirm this update, bit overkill if you ask me but hey i guess they have hundreds of thousands of people watching them now so they have to be on top of things, even if they do get made out to be fools so often. Reports on CNN have bits of the email that has been getting sent out One of the comments on the recent release note state the following:

I got that e-mail, but it was in my spam folder so I trusted gmail… the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number…so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you’ll be up and running very fast. Best Wishes 🙂 ******

Another comment on the profile page makes a slight attack towards them with some very good points they might want to pay attention to.

George (or any other Stratfor VP) since emails to [email protected] still bounce please comment on: 1. What steps you are taking to ensure all your ‘members’ data is secure when you re-launch and you won’t repeat the same mistakes again. Have you said sorry yet and explained why data was unencrypted? 2. What steps you are doing to ensure recipients of your emails can validate they are legitimate and not spoofed or worse still – doctor’ed documents (with malicious content, or cleverly manipulated situations reports). I do wonder what someone could do by secretly and slowing manipulating your situational reports over say 6 months? So far I have not seen anything that suggests you deserve my trust You know, I even read Fred Burtons book and he himself makes reference to years worth of intelligence lost once a CIA station chief (If I recall correctly) was lost – isn’t this the same situation – how many of your ‘sources’ now trust you to speak in confidence without fear they will be compromised next time Anonymous comes knocking on your email server?

Video from STRATFOR And the message that STRATFOR has released.

Dear readers, While addressing matters related to the breach of Stratfor’s data systems, the company has been made aware of false and misleading communications that have circulated within recent days. Specifically, there is a fraudulent email that appears to come from George.Friedman[at]Stratfor.com. I want to assure everyone that this is not my email address and that any communication from this address is not from me. I also want to assure everyone that Stratfor would never ask customers and friends to provide personal information through the type of attachment that was part of the email at issue. This email, and all similar ones, are false and attempt to prey on the privacy concerns of customers and friends. We strongly discourage you from opening such attachments. We deeply regret the inconvenience this latest development has created. While Stratfor works to reestablish its data systems and web presence, we ask everyone to please look for official communications, such as this one, and to monitor the Stratfor Facebook page and Twitter feed for company-approved communications. Thank you for your patience. Please direct any questions and concerns to [email protected]. Sincerely, George Friedman To verify the validity of this communication from Stratfor, please view this video of our VP of Intelligence, Fred Burton, which references and authenticates this post.

For more on the STRATFOR hacks check here


Related:

  • Large medical lab in South Africa suffers multiple data breaches
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Fourth Circuit Weighs in on Standing in Data Breach Class Actions
  • Is your cyberinsurance paid up? Are you sure?
  • Software dev accidentally leaks Australian govt documents
Category: Breach Incidents

Post navigation

← Israeli Server Hacks, More Attacks to Come. Another 11k CC’s Released
SRA International Awarded $60 Million Single-Award Contract from National Institutes of Health →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Marquis data breach impacts over 74 US banks, credit unions
  • Virginia Twins Arrested for Conspiring to Destroy Government Databases
  • Cyberattack on Puerto Rico IT vendor Truenorth hits 3 agencies
  • Easy Question, Complicated Answer: What Does It Take to Stop Workers From Snooping?
  • Update on Dos-OP’s report on Nova RaaS
  • KR: Privacy Commissioner’s Office Urges the Public to Beware of Fraudsters Exploiting the Tai Po Fire Disaster
  • Cyber attack on Indian airports? Govt explains the scary threat that disrupted 400 flights last month.
  • How a noisy ransomware intrusion exposed a long-term espionage foothold
  • KR: Hacking scheme targeted 120,000 home cameras for sexual footage
  • GreyNoise launches free scanner to check if you’re part of a botnet

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • EU justice chief draws red line on privacy reforms
  • Kaiser Permanente to Pay Up to $47.5M in Web Tracker Lawsuit
  • How Palantir shifted course to play key role in ICE deportations
  • U.S. Judge Blocks Trump From Cutting Medicaid Funding For Planned Parenthood In 22 States
  • India backs off mandatory ‘cyber safety’ app after surveillance backlash

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.