Aug 19, 2011 17:54 GMT  ·  By

Hackers associated with Anonymous' AntiSec campaign have targeted yet another US defense contractor and leaked business emails belonging to one of its senior officers.

In a post on Pastebin, the hackers announced the release of 1GB worth of emails belonging to Richard T. Garcia, Senior Vice President of Vanguard Defense Industries (VDI), a company that specializes in the manufacturing of unmanned aerial vehicles (UAVs).

"This leak contains internal meeting notes and contracts, schematics, non-disclosure agreements, personal information about other VDI employees, and several dozen 'counter-terrorism' documents classified as 'law enforcement sensitive' and 'for official use only'," the hackers write.

The targeted VDI officer, Richard T. Garcia, is also an executive board member of InfraGard, an alliance of private contractors and governmental organizations sponsored by the FBI that was previously attacked by LulzSec and Anonymous.

"It is our pleasure to make a mockery of InfraGard for the third time, once again dumping their internal meeting notes, membership rosters, and other private business matters," the hackers say.

The attackers also issue a warning to the white hat hackers that collaborate with law enforcement and other government agencies: "We're coming for your mail spools, bash history files, and confidential documents."

Anonymous' Operation Anti-Security (AntiSec) targets governments around the world and companies working with them with a stated goal of exposing corruption and unethical behavior.

AntiSec hackers have already declared war to the US intelligence community and this is the sixth government contractor that suffers a security breach at their hands. Previous targets included HBGary Federal, InfraGard, IRC Federal, Booz Allen Hamilton and ManTech.

Law enforcement agencies around the world have begun to take the Anonymous seriously and arrests were operated in several countries including US, UK, Spain, Italy, the Netherlands and Turkey.

However, most of the arrested individuals were low-level supporters who participated in DDoS attacks. None of the capable hackers that support the group have been yet identified.