It's not a V bottom, it's not a U bottom, it's a Nike swoosh recovery - Greg McLenon, Hotovec Pomeranz
HACKTIVIST GROUP Anonymous has taken over the web site of security firm Panda Labs, posting an anti-security message and a statement about Sabu, the hacker turned stool pigeon.
"Yeah yeah, we know, Sabu snitched on us. As usually happens FBI menaced him to take his sons away. We understand, but we were your family too," said a message at the top of the hacked Panda Labs page.
"LOL HE ASKED FOR THE LULZ!!!! HERE IT IS THE LULZ. Pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has [been] earning money working with law enforcement to lurk and snitch on anonymous activists...yep we know about you. How does it feel to be the spied one?"
The pandalabs.pandasecurity.com URL does not return a live page at time of writing, only a message that there has been a problem loading it. A Google search shows information from the hacked page in the results under the URL, which could be embarrassing for the firm.
We have asked Panda Labs to comment, but in the meantime Anonymous accounts are saying that the hack is payback for its work with law enforcement agencies, which could have aided in the arrest of its members.
Panda has responded to our request for comment, and stressed that no real harm has been done.
"On March 6th the hacking group LulzSec, part of Anonymous, obtained access to a Panda Security webserver hosted outside of the Panda Security internal network. This server was used only for marketing campaigns and to host some of the company's blogs," it said.
It added that the attack had not had much impact on it and would not affect its customers. It added that no information had been accessed, not even any marketing information that might have been stored on the web site.
"Neither the main website www.pandasecurity.com norwww.cloudantivirus.com were affected in the attack. The attack did not breach Panda Security's internal network and neither source code, update servers nor customer data was accessed," it said.
"The only information accessed was related to marketing campaigns such as landing pages and some obsolete credentials, including supposed credentials for employees that have not been working at Panda for over five years. We continue investigating the cause of the intrusion and will provide more details as soon as they become available." µ
Sign up for INQbot – a weekly roundup of the best from the INQ