Exposed : HBGary wanted to suppress Stuxnet research !
Feb 13, 2011
It is no secret that in recent days, Anonymous Operatives have released a cache of HBGary Federal internal emails to the public. Crowdleaks has discovered that within these communications, Aaron Barr received a copy of Stuxnet (a computer worm that targets the types of industrial control systems (ICS) that are commonly used in infrastructure supporting facilities) from McAfee on July 28, 2010. In an effort to confirm this was in fact Stuxnet, Crowdleaks has decompiled some of the source code, which can be found. Throughout the following emails it is revealed that HBGary Federal may have been planning to use Stuxnet for their own purposes. In a message sent to all email account holders at HBGary.com, Charles Copeland (Lead Support Engineer at HBGary, Inc.) writes: from: Charles Copeland to: all@hbgary.com date: Sat, Sep 25, 2010 at 9:54 PM subject: Stuxnet Worm Mail...