It would seem that STRATFOR has been taken for fools again, this time some one has hijacked the official email message and started sending it out to the exposed clients list. Now its really no need to explain who and what has happened to them over the past weeks so lets just move on. Now really anyone could of seen this coming, it was just a matter of time. In response to the emails STRATFOR has released [another updated](I got that e-mail, but it was in my spam folder so I trusted gmail... the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number...so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you'll be up and running very fast. Best Wishes :) Milena) via its facebook page and a video to confirm this update, bit overkill if you ask me but hey i guess they have hundreds of thousands of people watching them now so they have to be on top of things, even if they do get made out to be fools so often. Reports on CNN have bits of the email that has been getting sent out One of the comments on the recent release note state the following:
I got that e-mail, but it was in my spam folder so I trusted gmail... the e-mail address was: [email protected] via zulu705.server4you.de, and also the text was very unprofessional, and there was a phone number...so I think that is very easy to spot that misleading e-mail. Hope that Stratfor will soon solve the problem and that you'll be up and running very fast. Best Wishes :) ******
Another comment on the profile page makes a slight attack towards them with some very good points they might want to pay attention to.
George (or any other Stratfor VP) since emails to [email protected] still bounce please comment on: 1. What steps you are taking to ensure all your 'members' data is secure when you re-launch and you won't repeat the same mistakes again. Have you said sorry yet and explained why data was unencrypted? 2. What steps you are doing to ensure recipients of your emails can validate they are legitimate and not spoofed or worse still - doctor'ed documents (with malicious content, or cleverly manipulated situations reports). I do wonder what someone could do by secretly and slowing manipulating your situational reports over say 6 months? So far I have not seen anything that suggests you deserve my trust You know, I even read Fred Burtons book and he himself makes reference to years worth of intelligence lost once a CIA station chief (If I recall correctly) was lost - isn't this the same situation - how many of your 'sources' now trust you to speak in confidence without fear they will be compromised next time Anonymous comes knocking on your email server?
Video from STRATFOR And the message that STRATFOR has released.
Dear readers, While addressing matters related to the breach of Stratfor’s data systems, the company has been made aware of false and misleading communications that have circulated within recent days. Specifically, there is a fraudulent email that appears to come from George.Friedman[at]Stratfor.com. I want to assure everyone that this is not my email address and that any communication from this address is not from me. I also want to assure everyone that Stratfor would never ask customers and friends to provide personal information through the type of attachment that was part of the email at issue. This email, and all similar ones, are false and attempt to prey on the privacy concerns of customers and friends. We strongly discourage you from opening such attachments. We deeply regret the inconvenience this latest development has created. While Stratfor works to reestablish its data systems and web presence, we ask everyone to please look for official communications, such as this one, and to monitor the Stratfor Facebook page and Twitter feed for company-approved communications. Thank you for your patience. Please direct any questions and concerns to [email protected]. Sincerely, George Friedman To verify the validity of this communication from Stratfor, please view this video of our VP of Intelligence, Fred Burton, which references and authenticates this post.
For more on the STRATFOR hacks check here