Showing posts sorted by relevance for query LulzSec. Sort by date Show all posts
Showing posts sorted by relevance for query LulzSec. Sort by date Show all posts

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

FBI Used LulzSec To Track & Spy on Wikileaks Founder Julian Assange

After the inside story of Anonymous former leader Hector Xavier Monsegur aka "Sabu" case get revealed, the world came to know that Sabu was working as an under cover agent of FBI which lead a series of arrest for several key members of hacker collective Anonymous & LulzSec. Now we got another twist which came from a new book written by Parmy Olson, the London bureau chief for Forbes Magazine, saying that FBI used an agent inside the LulzSec hacker group to track and spy on Wikileaks founder Julian Assange. According to the book, an associate of WikiLeaks contacted LulzSec spokesman Topiary on June 16 hours after the assault on the CIA. The two would eventually converse over an Internet Relay Chat channel that was reported to be witnessed by Assange, who confirmed his identity by providing a video to the hacker in real time during their chat. For a few weeks, writes Olson, Assange and/or his associate returned to the LulzSec IRC channel “four or five more times,” during which others occasionally engaged in conversation with both sides. During at least one of those conversations, Assange’s contact at WikiLeaks offered LulzSec a spreadsheet of classified government data contained in a file named RSA 128, which she says was heavily encrypted and needed the manpower of black hat hacktivists to decode.
According to an exclusive report of RT - Aside from a few unsealed court documents, details about the now-defunct hacktivism group LulzSec remains few and far between. One journalist is saying she got inside the organization though — along with Julian Assange.
“We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency” is an upcoming book from Parmy Olson, the London bureau chief for Forbes Magazine. And although her alleged account has not yet hit the shelves, a lengthy excerpt has been leaked to the Web — and its contents suggest that that the world’s once most powerful hacking collective was in correspondence with WikiLeaks founder Julian Assange after he allegedly reached out to the organization for assistance. The US government says that they had already infiltrated LulzSec by then, though, meaning that WikiLeak’s plea to the hacking collective was actually being offered to an FBI mole.
According to Olson, the June 2011 attack on the public website of the US Central Intelligence Agency by LulzSec caught the attention of Assange, who was residing in the countryside manor of an English journalist while on house arrest.Once he saw that a LulzSec-led invasion had crippled CIA.gov, Assange allegedly sent out two tweets from the WikiLeaks Twitter account, only to delete the micomessages shortly after:
"WikiLeaks supporters, LulzSec, take down CIA . . . who has a task force into WikiLeaks," read one."CIA finally learns the real meaning of WTF” reads the other.
Assange “didn't want to be publicly associated with what were clearly black hat hackers” writes Olson, speaking of computer compromisers who target network for perhaps no real intention other than mischief making. “Instead, he decided it was time to quietly reach out to the audacious new group that was grabbing the spotlight,” she says. Olson says that one of those hackers aware the newfangled relationship was Hector Xavier Monsegur, who spearheaded LulzSec by serving as a leader of sorts under the handle Sabu. Perhaps unbeknownst to all engaged in the IRC chats, however, was that Sabu had been arrested on June 7 and, according to the federal government, began immediately working as an FBI informant.
"Since literally the day he was arrested, the defendant has been cooperating with the government proactively," Assistant US Attorney James Pastore said at a secret bail hearing on August 5 2011, according to a transcript released this March after his arrest was made public.
While details of Sabu’s escapades under the direct influence of the FBI are obviously being kept confidential, federal attorneys have said that the hacker more or less masterminded the group under their command until LulzSec dissolved on June 25; Jake Davis — Topiary — was arrested in the UK on August 1. If Olson’s allegations add up, that could mean that the FBI’s top-secret informant, Sabu, was speaking directly with America’s cyber-enemy number one: Julian Assange.
On Wednesday this week, the UK Supreme Court agreed to extradite Assange to Sweden, where he is facing a lawsuit unrelated to his involvement with WikiLeaks. Once there, however, the United States may be able to more easily fight to have him sent stateside to be charged with aiding the enemy — the crime being pegged to alleged WikiLeaks contributor Bradley Manning, who now faces life in prison for that involvement. The uncertainty of who exactly conversed with whom might be near impossible to confirm given the widespread anonymity of hacktivists tied with LulzSec and Anonymous alike, but if Olson’s account adds up, the FBI’s inside man may very well have come close to working with Assange. On his part, Topiary claims that he never received the RSA 128 file.




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec hacked porm sites, then next target is Onile Gamming (Brink & Bethesda)



Hacking collective Lulz Securtiy (LulzSec) has made headlines most recently with high profile intrusions  and data compromising on websites owned by PBS, Sony, FOX and Unveilance a whitehat security company that specializes in data breaches and botnets. With each successful breach LulzSec posts a press release on it’s website listing it’s spoils of war, usernames, passwords, email address, etc. LulzSec, like hacktivist group Anonymous is made of an unknown amount of individuals located from around the world. They operate in a similar manner in which communication is made in an IRC chat room(s) and the assumption is that there is no clear leadership or structure, though that remains to be seen. There has been recent IRC Chat logs and other data mining that suggests the two groups have ties to one another, an assumption LulzSec denies.
This past Friday afternoon the group announced that it had stolen and posted administrative emails and passwords for 50+ porn sites, along with 26,000 emails and passwords for users of the adult content website Pron.com.
Hi! We like porn (sometimes), so these are email/password
combinations from pron.com which we plundered for the lulz
Check out these government and military email
addresses that signed up to the porn site…
They are too busy fapping to defend their country
The group was quick to point out that six of the 26,000 email addresses stolen from Pron.com contained those who signed up for the site using their government or military (.gov and .mil) email accounts.
LulzSec, called on its followers over Twitter to try and use the credentials to log into Facebook, and to post on the compromised accounts to show their propensity for Internet porn. Facebook quickly responded to by matching up the leaked email addresses against its own database and resetting those users passwords.
In an unexpected twist though, LulzSec has now turned it’s reticule on Bethesda and its online FPS game Brink. It started on Sunday (June 12th) with tweets from their LulzSec twitter account:
“We were going to keep this little treasure chest to ourselves, but it appears the hand has been bitten. Say your prayers, Brink users >:]”
Followed by:
“Big lulz coming up in the near future. Time to show these bitches how it’s done. #Brink #Bethesda #ZeniMax.”
The group later tweeted again that it would have carried out the attack yesterday but that it looked forward to releasing ‘it” in 24hrs.
“We’d release right now, but we’re missing one vital ingredient to complete our victory soup. No ETA, but we’re hoping in the next 24 hours.”
The news only gets more bleak with the tweet “Snap your minds into a new realm, my friends. We did it because they couldn’t stop us – and did it we did, as you’ll see. We always deliver.” almost indicating that the hack has been completed, whatever “it” may be. There hasn’t been any word from Bethesda on the matter as of this write up but it appears that the Bethesda Store is currently unavailable and has been since 3pm yesterday which was around the time the first LulzSec tweet was posted in regards to Bethesda. If you or anyone you know has a Bethesda account I encourage you to at least change your password as soon as possible and as a general rule of thumb if you use the same password on multiple sites/services change those as well. Since we don’t know the full reach and exposure of what LulzSec has accomplished be on the look out of any personal information of yours that may be associated with Bethesda so that you are aware of just what information of yours must be watched closely or altered in the near future.

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker 'Raynaldo Rivera' Arrested Over Sony Pictures Hack

LulzSec Hacker 'Raynaldo Rivera' Arrested Over Sony Pictures Hack

Last year hackers have targeted Sony many times.  Hacktivist AnonymousLulzsec have penetrated Sony's PSN network and stolen millions of user personal information. Later Sony was forced to shutdown its entire network & apologized for the whole massacre. Not only PSN, also Sony Online EntertainmentSony Pictures, Several Sony's official website from different countries fallen victim to the hackers.  But in 2012 all the key members of LulzSec, who was mainly responsible for attack on Sony get busted one by one. Among them we can take the name of Jeremy Hammond, Ryan Ackroyd, Ryan Cleary, Jake Davis & so on. In the last move another hacker from LulzSec has been arrested in connection with an attack on Sony Pictures in June last year. A 20-year-old man 'Raynaldo Rivera' surrendered to FBI agents on Tuesday for his alleged hacking of Sony Pictures. If convicted, he could face up to 15 years in prison.
The arrest comes shortly after a judge postponed the sentencing of LulzSec ringleader Hector Xavier Monsegur, known by his nickname "Sabu," for his continued cooperation in the investigation. Monsegur provided information to the FBI, leading to the arrests of one American man and four in the U.K. in March. 
Rivera allegedly used a proxy server to hide his real IP address and used a SQL injection attack against Sony, according the indictment, which was unsealed on Tuesday. The type of attack involves the input of commands into web-based forms to see if the backend database will yield information. Rivera, who went by the online nicknames "neuron," "royal" and "wildicv," allegedly distributed Sony's information to other LulzSec members, who publicized it on the @LulzSec Twitter account, the indictment said. Damages to Sony exceeded US$5,000.
Prosecutors allege Rivera worked with Cody Kretsinger, who was indicted in Sept. 2011 for the same attacks on Sony. Kretsinger allegedly provided the coupon codes along with email addresses and passwords for an extensive data release by LulzSec on June 2, 2011. Kretsinger pleaded guilty in April and is scheduled for sentencing on Oct. 25, according to the FBI.



-Source (BBC, PCW)







SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Self Propagated LulzSec Leader 'Aush0k' Arrested By Australian Federal Police

Self Propagated LulzSec Leader 'Aush0k' Arrested in Sydney By Australian Federal Police (AFP)

Many of us knew Hector Xavier Monsegur widely known as 'Sabu' as the leader of infamous international hacker group LulzSec and Antisec. But this idea will surely be changed when you will hear the histrionic story, which came to light when a 24 old Australian proclaimed himself as the leader of notorious hacker collective group Lulz Security also known as LulzSec. The man, known online as Aush0k, is a senior Australian IT professional who works for the local arm of an international IT company. Police say he was in a "position of trust" within the company and had access to information on government clients which Aush0k manipulated and misused. According to Australian Federal Police a special investigation began less than two weeks ago when investigators found a government website had been compromised. The man has been charged with two counts of unauthorized modification of data to cause impairment and one count of unauthorized access to a restricted computer system. He faces a maximum of 12 years in jail. AFP Commander Glen McEwen says the man posted in online forums frequented by other members of LulzSec that he was the group's leader. "There was no denials of his claims of being the leader," added McEwen. The man was charged and appeared in court on the very day of his arrest. And he will face Woy Woy Local Court again on May 15. 
While talking about this dramatic story of proclaimed LulzSec leader Aush0k, we would love to remind you the decent history when the leader of Anonymous affiliated LulzSec "Sabu," whose real name is Hector Xavier Monsegur, turned traitor to his community and became FBI informer and provided all the information on fellow hackers. As soon as the FBI gathered all the sensational information from Sabu, immediately we have seen the arrest of almost all the key members of LulzSec including Ryan ClearyJake DavisJeremy HammondRaynaldo RiveraCody Kretsinger and so on. And today we have seen the arrest of another LulzSec leader and key man, and this arrest is the first one done by the AFP. Earlier the arrest of Sabu proved very handy for the law and enforcement, may be this time also Aush0k's arrest can show them few more directions and can open few closed doors of investigation. So till time wait and stay tuned with VOGH for the updates on this story, also all the other cyber updates. 



-Source (ABC News)




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

CSS Corp- Global Information & Communication Technology Services Hacked By LulzSec

CSS Corp- Global Information & Communication Technology Services Hacked By LulzSec

LulzSec Reborn the newly formed hacker group who are claiming to be a part of hacktivist Anonymous strikes again. Yesterday the have hacked into the data base of MilitarySingles.com and exposed more than 163,792 user details including names, usernames, e-mail addresses, IP addresses, and passwords. Now they have find their second target and that is CSS Corp (Global Information & Communication Technology Services). In a pastebin release they hacker group who are claiming to be infamous Lulzsec or in other word modified Lulz have posted entire email database of CSS Corp. Also they have leaked details (Email-id, Full name, user name, mobile number) several CSS users. Here’s what the group tweeted via the Twitter account lulzboatR, which now has over 2,000 followers. Still it is unclear that is it really the come back of Lulzsec or Lulz Security because the twitter account LulzSec is still silent and lulzsecurity.com is still down. And also if LulzSec Reborn is the revised Lulzsec then what about 1st April declaration made by FawkesSecurity. So here again it fully depends on you that will you trust these newly formed groups or just let them go. 




SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sabu Former #LulzSec #Anonymous Leader Working As An Informant For FBI (Key-Members of LulzSec Arrested)

Sabu Former #LulzSec #Anonymous Leader Was Working As An Informant For FBI (Key Members of LulzSec Arrested)
Several members of the LulzSec and Anonymous hacking groups were arrested this morning by the Federal Bureau of Investigations. It is reported that the arrests were made possible after turning the group’s "senior leader", Hector Xavier Monsegur aka "Sabu", 28, who is believed to be a cooperative witness after the FBI turned him last June. Monsegur pled guilty to several charges of computer hacking conspiracy, for which he could receive a maximum of 124 years behind bars. Those arrested today included a member of the AntiSec hacking group who is believed responsible for the massive intrusion at security think tank Stratfor last December.
A law enforcement official in New York confirmed the arrests and said that six hackers belonging to the Anonymous, LulzSec and Antisec groups were nabbed in U.S. and overseas locations. The official described those arrested as "principal members" of Anonymous and LulzSec. The five hackers are identified in the report as Ryan Ackroyd, aka "Kayla" and Jake Davis, aka "Topiary" from London, two residents of Ireland, Darren Martyn, aka "pwnsauce" and Donncha O'Cearrbhail, aka "palladium", and Jeremy Hammond aka "Anarchaos," from Chicago, USA. According to the FBI press release, all but Davis face charges of computer hacking conspiracy and various other charges. Each carries a maximum 10 year prison sentence.
According to Anonymous Twitter feed: "We are Legion. We do not have a leader nor will we ever. LulzSec was a group, but Anonymous is a movement. Groups come and go, ideas remain"
It is unclear what to expect from Anonymous in reaction to the arrests. The hacking group is known for revenge cyber attacks. After 25 Anonymous members were arrested on February 29, the group downed Interpol’s main website. The same thing happened when the CIA website became a victim of Anonymous. The group also downed several large music industry, Department of Justice, FBI and many other federal authorities websites in response to the shutting down of Megaupload and the arrest of its founder Kim Dotcom. 
News of Sabu's arrest prompted several tweets from Anonymous this morning, including one that threatened retaliation. "The way Sabu & gang took control of Anonops.. anonops gonna retaliate," the tweet said.
 

-Source (FOXNews, Computer World)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Hacker Cody Kretsinger Sentenced 1 Year Imprisonment For Sony Breach

LulzSec Hacker Cody Kretsinger Sentenced 1 Year Imprisonment For Security Breach of Sony Pictures Entertainment  

Infamous LulzSec hacker Cody Kretsinger who pleaded guilty last year in front of Federal Court of California for taking part in an extensive computer breach of Sony Pictures Entertainment server has faced judgement. 25 year aged Kretsinger who is also known as "Recursion" was one of the key member of Lulz Security, widely known to us as LulzSec, an offshoot of the international hacking group Anonymous. According to federal prosecutors, Cody Kretsinger has been sentenced to one year in prison in  Los Angeles. This court rule has been followed by home detention. Kretsinger, was also been ordered by a U.S. district judge in Los Angeles to perform 1,000 hours of community service after his release from prison, said Thom Mrozek, spokesman for the U.S. Attorney's Office in Los Angeles. Although prosecutors refused to say whether the hacker was co-operating with authorities in return for a softer sentence. 
During last year's plea hearing, Kretsinger told a federal judge that he gained access to the Sony Pictures website and gave the information he found there to other members of LulzSec, who posted it on the group's website and Twitter. "I joined LulzSec, your honor, at which point we gained access to the Sony Pictures website," said Kretsinger in the federal court. Prosecutors said Kretsinger and other LulzSec hackers, including those known as "Sabu" and "Topiary," stole the personal information of thousands of people after launching an "SQL injection" attack on the website; ultimately caused the unit of Sony Corp more than $600,000 in finical damage, along with that the attack caused bad impact and loss of faith for Sony Corporation and it's customers across the globe. 
While talking about this story, we would like to recap the decent history - where the arrest followed by guilty pleading of all the key members of LulzSec including  Ryan Cleary, Jake DavisJeremy HammondRaynaldo RiveraCody Kretsinger came a month after court documents revealed that Anonymous leader "Sabu," whose real name is Hector Xavier Monsegur, turned traitor to his community and became FBI informer and provided all the information on fellow hackers.


-Source (Reuters & Yahoo) 





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Special Offer From Lulzsec: Catch Me If You Can


"Catch Me If You Can" yes you all are right the famous Hollywood  Movie of Leonardo Wilhelm DiCaprio on Social Engineering, one of the Un-patched vulnerability ever.  Now Lulzsec one  of the most wanted hacker group  over the whole spectrum is exactly saying or we can say repeating the same words Catch Me If You Can LulzSec‘s tracks are still under observation by US authorities to get over this catch-me-if-you-can hacking group. Traversing through the hackers, left marks in Scotland Yard, authorities have trapped total of four suspected targets.
The LulzSec is also thought to be behind the Federal LLC (a U.S.-based security company) attack. The operational hacking strategies, used in this attack, were given a pseudonym-“Kayla.”
According to the US law enforcement agencies, 2011 has been entitled the year of hackers and security violation. Series of prestigious security breaches, by Anonymous (The hacking group), included breaches of agricultural company Monsanto and NATO, U.S. military contractor, Booz Allen Hamilton. Whereas the LulzSec group was involved in setting targets to take down, especially U.S. Senate, PBS, the CIA, sites and many more.
Though, searches and efforts were being carried out by the authorities worldwide to fight against this blatant LulzSec group, but still it seems challenging to trace them out. During these searches, sixteen people were eventually arrested by US officials for their cyber attacks on PayPal.
The streak of security breaches continues regardless of whatever efforts are being put by the authorities, it looks like as the group tends to play hide and seek on long term basis. Later on, a law enforcement site belonging to Texas Police Chiefs Association got hit by unusual malicious acts of Anonymous group.
Unlike the better-known Anonymous hacking group, LulzSec cyber attacks are not launched on the basis of political motivation, but the hacking group has strong connections with “antiSec” movement and do consider political reasons as their foundation to hit the specified target. The malicious acts of LulzSec are definitely entertaining them at one side, but a big loss of sensitive information on other.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Lulzsec may be Officially Disbanded, But FBI is In Search of Lulzsec


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Jeremy Hammond -Key Member of Anonymous Affiliated LulzSec Pleads Guilty To Stratfor Hack

Jeremy Hammond -Key Member of Anonymous Affiliated LulzSec Pleads Guilty To Stratfor Hack, Could Face 10 Years In Prison

Lulz Security widely known as LulzSec, the most dangerous hacker collective group who set their devastating hacking rampage for fifty days in which they have successfully penetrated almost all the so called top secure fields; has suddenly stopped their sail. But stopping crime never means that the criminal will be overlooked, the pending punishment will surely take place. And this applied from LulzSec also. Lat year we have seen leader of LulzSec and also also leader of infamous hacker collective group Anonymous code-named "Sabu," whose real name is Hector Xavier Monsegur, turned traitor to his community and became FBI informer and provided all the information on fellow hackers. The arrest of Sabu subsequently helped law-enforcement officials to infiltrate Lulzsec, an offshoot of Anonymous, the loose hacking collective that has supported an ever-shifting variety of causes. The information provided by Sabu lead FBI to arrest all the key members of LulzSec including Ryan ClearyJake Davis, Raynaldo RiveraCody Kretsinger and so on. Among them there was Jeremy Hammond widely known as "Anarchaos" who was arrested by the federal authorities and been charged for the  breach of the security analysis company Stratfor. In December last year the bail application of Hammond was also been rejected by the the Court. So after several hearings finally the accused of security breach against global intelligence firm Stratfor,  Jeremy Hammond pleaded guilty in a Manhattan court to one count of computer fraud and abuse in response to charges that he hacked into the network of the privacy intelligence firm Stratfor, stealing millions of emails that eventually were given to WikiLeaks and published over the course of 2012. The plea agreement could carry a sentence of as much as 10 years in prison, as well as millions of dollars in restitution payments, though Hammond’s official sentence won’t be handed down until September. Hammond also told Judge Loretta A. Preska of Federal District Court in Manhattan that in 2011 and 2012 he had gained unauthorized access to Stratfor’s computer systems and several other groups, including the Federal Bureau of Investigation’s Virtual Academy, the public safety department in Arizona, and Vanguard Defense Industries, which makes drones. 
"Now that I have pleaded guilty, it is a relief to be able to say that I did work with Anonymous to hack Stratfor, among other websites," Hammond said in a statement on last Tuesday. 
A petition posted to Change.org by Hammond’s brother Jason Hammond asks the judge in Hammond’s case, Loretta Preska, to sentence him to time served, given that he’s already spent 15 months in lockup. “Jeremy did nothing for personal gain and everything in hopes of making the world a better place,” reads Hammond’s brother’s petition. “Jeremy is facing a maximum sentence of ten years, but the minimum is zero. He has been in jail since March 2012 awaiting trial and now sentencing. It’s time for him to come home.”


-Source (Forbes & Huffington Post)





SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Sun Email Is Still Under Control Of Lulzsec


"The ironic twist will be that my own friends will take me down and not these idiots who hide behind the patriot veil," said Sabu. However, despite the very real possibility that his former hacking mates will expose him, Sabu doesn't plan to stop hacking or go into hiding. "I'm at the point of no return. Not trying to sound like a bad ass, however, it's the truth," he concluded.
The 4GB worth of email stolen by the LulzSec hacking group from The Sun tabloid site earlier this year are sitting on a server in China, according to "Sabu," the outfit's alleged leader.
"We got them stashed on a Chinese storage server. Alongside the dumps of a whole bunch of hits we did," Sabu said during a question and answer session held on Reddit this weekend. LulzSec kept corporate IT security departments on their toes for weeks back in May and June when the group randomly attacked many companies for fun.
The hacking group said they disbanded on June 26, after 50 days of mayhem that left thousands of innocent users with their personal information and passwords exposed, only to re-emerge a month later. On July 18, at a time when new revelations were being made in the News of the World phone hacking case, LulzSec attacked its sister publication, The Sun. The hackers managed to post a fake story on the newspaper's website and claimed to have copied its email database.
The group originally intended to publish the email, but later decided against it, allegedly because they could have badly affected the court case against those involved in the scandal. It's not clear if the messages will be released when the case is over and who else except Sabu has access to them.
For a while LulzSec seemed to be one step ahead of the authorities, its members apparently confident that they couldn't get caught. However, several people associated with the group were eventually identified and arrested.
Such was the case with Jake Davis, an 18-year-old teenager from the U.K., who used the online alias "Topiary" and played a spokesperson role within LulzSec and Anonymous. "I miss Topiary. We became brothers," said Sabu during the Reddit Q&A session. "Lost too many friends. Will probably never talk to them ever again," he added.
Last month the FBI arrested a 23-year-old man from Tempe, Ariz., named Cody Kretsinger who is believed to be a former LulzSec member known as "recursion." Sabu claims that arresting recursion was probably the closest authorities got to him.
It's not clear if by closest he refers to his location or to information that could lead to him being caught. He remains defiant and doesn't believe that the FBI can catch him without help.



-News Source (Computer World)



SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec said: "Hack Attacks Will Continue Until Group Caught"



In a catch-me-if-you-can explanation of why it has targeted the likes of Sony, the U.S. Senate, an FBI affiliate, and online porn sites, the LulzSec hacking group says it plans to keep having fun until it gets caught. A statement the group has posted says going public with user personal details after a hack attack is better than keeping exploits private. It gives users a chance to change their passwords, the group says. Such public releases are also arguably good for websites too. After the group published 26,000 emails and passwords stolen from porn sites last week, Facebook automatically locked every account linked to the email addresses, stopping the kind of unauthorized access LulzSec discusses. LulzSec says its hack attacks will continue until "we're brought to justice, which we might well be." The group's statement amounts to a manifesto and is surprisingly more erudite than might be expected. "We're attracted to fast-changing scenarios, we can't stand repetitiveness," the group says. "Nobody is truly causing the Internet to slip one way or the other, it's an inevitable outcome for us humans." And not everything the group has done has appeared malicious. Although ithacked into the British health system computers, it declined to cause damage or publish details, instead warning admins that the system was insecure.
The group denies it's locked in a hacker war with similar group Anonymous. This had been suggested after LulzSec targeted the 4Chan website with a denial of service attack following attempts by 4Chan users to expose members of LulzSec.
LulzSec members were considered righteous vigilantes by some sectors of the Internet after their repeated attacks against Sony, which were carried out in response to Sony's hounding of PS3 hardware hacker George Hotz. However, support has been waning after the group targeted non-Sony game servers this week. Perhaps surprisingly, in the statement the group attempts to distance itself from these attacks, pointing out they were done "by the request of callers [to its telephone request line], not by our own choice".  

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

After Ruling the WWW for 50 Long Days, LulzSec said now it's Interval


After Ruling the WWW for 50 Long Days, LulzSec said now it's Interval time. Hacker group LulzSec has announced that after 50 days of hacking companies and organizations, it is finally done. Check out the message from LulzSec below, which was posted on Pastebin. LulzSec most recently released a torrent of data from Arizona law enforcement which included hundreds of classified documents including personal emails, names and phone numbers.
The group was also behind attacks on Sony, attacks on PBS, the US Senate, the CIA, and a slew of gaming sites popular with 4Chan users including EVE Online, Minecraft and League of Legends. LulzSec was thought to have been the source of hacks against Scotland Yards and the UK Census, but the group denied involvement. As the post, says the group of six hackers has been “disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could.”

Click HERE to See the LulzSec Official Statement
This Is the video


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

LulzSec Security opens 'request line'



After claiming responsibility for attacking several sites, including the US Central Intelligence Agency, hacker group LulzSec opened its lines to accept hack requests.
Last Tuesday, the group posted a phone number on its Twitter account, as well as ports for online chats, inviting the public to "join the party."

"Call us: 614-LULZSEC (now accepting calls) |


 Join the party: irc.lulzco.org (port 6697 for SSL 


 channel #LulzSec or http://t.co/Sm5wHjd)," 





LulzSec had claimed it hacked the Public Broadcasting Service, an affiliate of the Federal Bureau of Investigation, and Sony. An article on PC World said the group disrupted websites during its "Titanic Takeover Tuesday." 
The PC World article said group's activities Tuesday disrupted the websites for The Escapist and the IT security company Finfisher, as well as the login servers for EVE Online, Minecraft and League of Legends. It said the group claimed to have received 5,000 missed calls and 2,500 voicemails. While the 614 area code represents Columbus, Ohio, "only an irresponsible gambler would wager that that will help authorities locate members of LulzSec in the slightest," "LulzSec is begging to get busted, but also, in a perverse way, 'giving back' to a community that enjoys seeing the flaws of big companies exposed. The ironic twist is that these big companies are made big by the average public whose private information is being revealed in the hacks,"


-News Source PCWorld

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...