lulzsec | KitGuru https://www.kitguru.net KitGuru.net - Tech News | Hardware News | Hardware Reviews | IOS | Mobile | Gaming | Graphics Cards Wed, 07 Mar 2012 08:17:31 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.3 https://www.kitguru.net/wp-content/uploads/2021/06/cropped-KITGURU-Light-Background-SQUARE2-32x32.png lulzsec | KitGuru https://www.kitguru.net 32 32 Lulzsec leader turned snitch after being arrested https://www.kitguru.net/channel/harrison/lulzsec-leader-turned-snitch-after-being-arrested/ https://www.kitguru.net/channel/harrison/lulzsec-leader-turned-snitch-after-being-arrested/#respond Wed, 07 Mar 2012 08:17:31 +0000 http://www.kitguru.net/?p=81981 Federal authorities said yesterday that a Lulzsec leader provided information on his colleagues after being arrested last year. The information helped authorities to arrest other top members of the hacking organisation. Hacker ‘Sabu', real name Hector Xavier Monsegur, 28 years old from New York has been working with the FBI undercover since he was arrested …

The post Lulzsec leader turned snitch after being arrested first appeared on KitGuru.]]>
Federal authorities said yesterday that a Lulzsec leader provided information on his colleagues after being arrested last year. The information helped authorities to arrest other top members of the hacking organisation.

Hector Xavier Monsegur

Hacker ‘Sabu', real name Hector Xavier Monsegur, 28 years old from New York has been working with the FBI undercover since he was arrested last June. The agents he worked with then arrested several suspects including two men from Ireland, two from Great Britain and an American from Chicago.

They are accused of breaking into computer systems, stealing confidential information, deleting data ‘including encrypted and unencrypted sensitive personal information for thousands of victims.' The court documents can be seen over here.

Hector is an unemployed father of two and according to reports, he was the ring leader of the hacking group from his base in a public housing project in New York. He has pleaded guilty to various hacking charges and could face up to 124 years in prison, although he is likely to already have received a plea deal on some level.

Wired add “The record unsealed Tuesday generally references him as CW-1. Federal authorities declined comment on whether Monsegur was the informant. But in court records, Stephanie Christensen, an assistant U.S. attorney in Los Angeles, said (.pdf) Monsegur “is actively cooperating with the government and has indicated an intent to continue working proactively with the government. Defendant has provided the government with detailed information concerning the activities of certain individuals who are suspected of being involved in the unauthorized computer intrusions or ‘hacks’ into various computer networks of several well-known corporations.”

Those arrested include Ryan Ackroyd, aka “Kayla” of Doncaster, United Kingdom; Jake Davis, aka “Topiary” of London; Darren Martyn, aka “pwnsauce” of Ireland; Donncha O’Cearrbhail, aka “palladium” of Ireland; and Jeremy Hammond, aka “Anarchaos”of Chicago.

Hammond, a member of Anonymous — a group loosely affiliated with LulzSec — is believed to be the main actor behind the hack of U.S. private intelligence company Stratfor in December, which resulted in the seizure of more than 5 million company e-mails, customer credit card numbers and other confidential information. The government said in a court filing that Hammond “used some of the stolen credit card data to make at least $700,000 worth of unauthorized charges.” The Stratfor hackers publicly said they were using the cards to make donations to charity, and provided screenshots.”

Kitguru says: His friends in the organisation face serious charges.

The post Lulzsec leader turned snitch after being arrested first appeared on KitGuru.]]>
https://www.kitguru.net/channel/harrison/lulzsec-leader-turned-snitch-after-being-arrested/feed/ 0
LulzSec Hacker ‘Recursion’ could spend 15 years in jail https://www.kitguru.net/channel/carl/lulzsec-hacker-recursion-could-spend-15-years-in-jail/ https://www.kitguru.net/channel/carl/lulzsec-hacker-recursion-could-spend-15-years-in-jail/#comments Fri, 23 Sep 2011 08:36:17 +0000 http://www.kitguru.net/?p=61156 The authorities have arrested Cody Kretsinger, aged 23 from Arizona. He has been charged with conspiracy and the unauthorised impairment of a protected computer in conjunction with an attack in May and June. Reuters have reported that Kretsinger was arrested yesterday by the FBI. He was apparently a member of Lulzsec – the well known …

The post LulzSec Hacker ‘Recursion’ could spend 15 years in jail first appeared on KitGuru.]]>
The authorities have arrested Cody Kretsinger, aged 23 from Arizona. He has been charged with conspiracy and the unauthorised impairment of a protected computer in conjunction with an attack in May and June.

Reuters have reported that Kretsinger was arrested yesterday by the FBI. He was apparently a member of Lulzsec – the well known group of hackers who have been targeting businesses and organisations this year. The indictment was unsealed yesterday in federal court in Los Angeles.

Kretsinger, who used the name ‘Recursion' probed into the Sony Inc. computer systems for vulnerabilities and stole confidential data, which was later posted on a LulzSec website and on the groups Twitter account.

LulzSec are known now to be affiliated with Anonymous, another high profile hacking organisation. They have made very public statements challenging the FBI and they posted a joint ‘security statement' in July.

If Kretsinger is convicted, he could spend up to 15 years in jail according to the FBI report.

The case is U.S. v. Kretsinger, 11-848, U.S. District Court, Central District of California (Los Angeles).

Kitguru says: Will this effect their operations?

The post LulzSec Hacker ‘Recursion’ could spend 15 years in jail first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/lulzsec-hacker-recursion-could-spend-15-years-in-jail/feed/ 4
Hackers claim corporations are ‘ridiculousy easy’ to attack https://www.kitguru.net/channel/carl/hackers-claim-corporations-are-ridiculousy-easy-to-attack/ https://www.kitguru.net/channel/carl/hackers-claim-corporations-are-ridiculousy-easy-to-attack/#comments Mon, 08 Aug 2011 07:01:07 +0000 http://www.kitguru.net/?p=55207 Hackers taking part in the Defcon conference in Las Vegas have said that corporations are ‘ridiculously easy' to attack. They claim that staff are poorly trained with security making it straightforward to plan a cyber attack against them. Hackers at Defcon take part in weekend contests to test their skills and a report from Reuters …

The post Hackers claim corporations are ‘ridiculousy easy’ to attack first appeared on KitGuru.]]>
Hackers taking part in the Defcon conference in Las Vegas have said that corporations are ‘ridiculously easy' to attack. They claim that staff are poorly trained with security making it straightforward to plan a cyber attack against them.

Hackers at Defcon take part in weekend contests to test their skills and a report from Reuters said that the hackers taking part were able to get employees in corporate businesses to browse websites they suggested.

One of the hackers, a contestant, pretended to be an employee of an IT company and persuaded a genuine employee of a big business to pass over information related to their computer. With that information, the hacker could easily decide what was the best form of attack to breach the computer and enter the internal network.

Reuters reported that Chris Hadnagy, one of the organisers said “For me it was a scary call because she was so willing to comply, A lot of this could facilitate serious attacks if used by the right people.”

Defcon is a positive venture, as it can help expose security problems in companies and can even help improve the state of their security defences.

Larry Ellison: Oracle CEO

Hadnagy also said “Oracle was wiped”, was related to the fact that they gave away the most data in the test attacks. Other companies that were targeted included AT&T, Apple, Symantec and Sysco.

Kitguru says: With the array of attacks in the last year from high profile hacking organisations such as Lulzsec and Anonymous, it is very important that businesses start to tighten their security.

The post Hackers claim corporations are ‘ridiculousy easy’ to attack first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/hackers-claim-corporations-are-ridiculousy-easy-to-attack/feed/ 2
Suspected Lulzsec 2nd in command arrested by Scotland Yard https://www.kitguru.net/channel/carl/suspected-lulzsec-2nd-in-command-arrested-by-scotland-yard/ https://www.kitguru.net/channel/carl/suspected-lulzsec-2nd-in-command-arrested-by-scotland-yard/#respond Thu, 28 Jul 2011 05:32:50 +0000 http://www.kitguru.net/?p=54451 Scotland Yard have arrested ‘Topiary', a well known hacker, who is said to be involved with prolific organisations Lulzsec and Anonymous. The 19 year old man has been arrested in the Shetland Islands and is currently being held in a central London police station. The Metropolian Police issued a statement yesterday: “Officers from the Metropolitan …

The post Suspected Lulzsec 2nd in command arrested by Scotland Yard first appeared on KitGuru.]]>
Scotland Yard have arrested ‘Topiary', a well known hacker, who is said to be involved with prolific organisations Lulzsec and Anonymous.

The 19 year old man has been arrested in the Shetland Islands and is currently being held in a central London police station. The Metropolian Police issued a statement yesterday:

“Officers from the Metropolitan Police Service’s Police Central e-Crime Unit (PCeU) today (27 July) arrested a 19-year-old man in a pre-planned intelligence-led operation.

The man arrested is believed to be linked to an ongoing international investigation in to the criminal activity of the so-called “hacktivist” groups Anonymous and LulzSec, and uses the online nickname “Topiary” which is presented as the spokesperson for the groups.”

In other hacking related news, another 17 year old is being questioned for connection to the inquiry, but he has not as yet been arrested.

According to online reports, Topiary is said to be ‘second in command' within Lulzsec. According to reports from other sources, his technical knowledge is not known to be as high as other members of the group, and he acted more as a PR representative for the hacking groups.

His Twitter account has been wiped of all comments, with only one statement posted as of time of publication.

It reads “You cannot arrest an idea”.

Kitguru says: Is the hieracy starting to topple?

The post Suspected Lulzsec 2nd in command arrested by Scotland Yard first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/suspected-lulzsec-2nd-in-command-arrested-by-scotland-yard/feed/ 0
Sun newspaper hacked by Lulzsec https://www.kitguru.net/channel/slyvia/sun-newspaper-hacked-by-lulzsec/ https://www.kitguru.net/channel/slyvia/sun-newspaper-hacked-by-lulzsec/#comments Tue, 19 Jul 2011 07:36:33 +0000 http://www.kitguru.net/?p=53571 It appears that Lulzsec, the famous hacking group, have not disbanded. They have apparently hacked The Sun Newspaper, owned by media tycoon Rupert Murdoch. The hack included the publishing of a fake story which said that Rupert Murdoch was found dead in his garden. Visitors to the website were then redirected to Lulzsecs Twitter Account, …

The post Sun newspaper hacked by Lulzsec first appeared on KitGuru.]]>
It appears that Lulzsec, the famous hacking group, have not disbanded. They have apparently hacked The Sun Newspaper, owned by media tycoon Rupert Murdoch.

The hack included the publishing of a fake story which said that Rupert Murdoch was found dead in his garden. Visitors to the website were then redirected to Lulzsecs Twitter Account, which at the time said “WE HAVE JOY WE HAVE FUN, WE HAVE MESSED UP MURDOCH'S SUN”

The last post on Lulzsec's Twitter page says “For all you new people that are watching us right now: this is what we do, this is how we do it. High-quality entertainment just for you”

Lulzsec: targeted The Sun Newspaper

News International took down both The Sun and The Times websites while they fixed their server.

Lulzsec have also said that they know the password of Rebekah Brook's email address. Rebekah was the chief executive of News International.

Kitguru says: Lulzsec are one of the most widely known group of hackers, and have over 300,000 followers on Twitter.

The post Sun newspaper hacked by Lulzsec first appeared on KitGuru.]]>
https://www.kitguru.net/channel/slyvia/sun-newspaper-hacked-by-lulzsec/feed/ 2
A-Team hacking group reveal Lulzsec members https://www.kitguru.net/channel/raymond-daily/a-team-hacking-group-reveal-lulzsec-members/ https://www.kitguru.net/channel/raymond-daily/a-team-hacking-group-reveal-lulzsec-members/#comments Wed, 06 Jul 2011 07:28:51 +0000 http://www.kitguru.net/?p=51974 Lulzsec have made quite a name for themselves in recent months, targeting many high profile companies across the globe. Until their recent disbanding they shared the limelight with Anonymous and some people have said that both groups shared members. The ‘A-Team' are another hacking group who apparently don't share very positive views on the skills …

The post A-Team hacking group reveal Lulzsec members first appeared on KitGuru.]]>
Lulzsec have made quite a name for themselves in recent months, targeting many high profile companies across the globe. Until their recent disbanding they shared the limelight with Anonymous and some people have said that both groups shared members.

The ‘A-Team' are another hacking group who apparently don't share very positive views on the skills of Lulzsec. Not only that but The New York Times reported that The A-Team published names, email addresses and phone numbers of Lulzsec online. The A-Team claim they are doing this because Lulzsec apparently “lack the skill to do anything more than go after the low-hanging fruit.”

Even though Lulzsec successfully targeted Sony, The U.S. Central Intelligence Agency and the Arizona State Police Department it appears that other hacking groups don't like them getting all the limelight.

Kitguru says: We aren't sure if the names and personal information posted by the A-Team will lead to any arrests or tracking of the individuals by government agencies, but you can be sure that there are many officials already investigating the information.

The post A-Team hacking group reveal Lulzsec members first appeared on KitGuru.]]>
https://www.kitguru.net/channel/raymond-daily/a-team-hacking-group-reveal-lulzsec-members/feed/ 2
ex Lulzsec members join Anonymous – its not over https://www.kitguru.net/channel/slyvia/ex-lulzsec-members-join-anonymous/ https://www.kitguru.net/channel/slyvia/ex-lulzsec-members-join-anonymous/#respond Tue, 28 Jun 2011 07:00:23 +0000 http://www.kitguru.net/?p=50906 A few days ago we reported that Lulzsec had disbanded. We also thought that due to close links members of Lulzsec would reenter the scene under a different banner. It didn't take long for well known hacking group Anonymous reported on their twitter account that “All @LulzSec members have reported aboard”. The latest attacks are …

The post ex Lulzsec members join Anonymous – its not over first appeared on KitGuru.]]>
A few days ago we reported that Lulzsec had disbanded. We also thought that due to close links members of Lulzsec would reenter the scene under a different banner. It didn't take long for well known hacking group Anonymous reported on their twitter account that “All @LulzSec members have reported aboard”.

The latest attacks are all aimed towards Tunisian web sites , due to state censorship of the net in the country. Anonymous have also released a new ‘counter cyber terrorism training file' onto many file sharing networks, easily accessible from anyone at home with the software installed. We haven't seen the data ourselves, but it appears to contain information which Lulzsec acquired from some government sites.

Other hacking organisations have stepped up to the plate since Lulzsec have disbanded, with one of the larger ones ‘TeaMp0isoN' saying that they will carry on their duties as planned. “Unlike @lulzsec, our movement dosent have an expiry date. . . . we wont ever backdown, this means a lot to us, time for a manifesto.” they said. They are the team who released Tony Blair's contact list a short while ago.

As we said days ago, the disbanding of Lulzsec was clearly not the end, the members are just moving teams, although rumours did indicate that several people in both Anonymous and Lulzsec were already working in both teams.

The post ex Lulzsec members join Anonymous – its not over first appeared on KitGuru.]]>
https://www.kitguru.net/channel/slyvia/ex-lulzsec-members-join-anonymous/feed/ 0
Have Lulzsec inspired something bigger? https://www.kitguru.net/channel/slyvia/have-lulzsec-inspired-something-bigger/ https://www.kitguru.net/channel/slyvia/have-lulzsec-inspired-something-bigger/#respond Mon, 27 Jun 2011 07:09:24 +0000 http://www.kitguru.net/?p=50785 We reported a few days ago that Lulzsec announced that the attacks would stop, after they posted a notice saying they were disbanding. Security experts however say that this might not end attacks, which have already hit dozens of high profile sites and businesses. Lulzsec have been unstoppable in recent weeks, taking down and exposing …

The post Have Lulzsec inspired something bigger? first appeared on KitGuru.]]>
We reported a few days ago that Lulzsec announced that the attacks would stop, after they posted a notice saying they were disbanding. Security experts however say that this might not end attacks, which have already hit dozens of high profile sites and businesses.

Lulzsec have been unstoppable in recent weeks, taking down and exposing data from the CIA, the United States Senate and Sony. As we noted the ‘we are not tied to this identity permanently’ was a key telling point in their original post and security experts have said that they are urging other hackers to join in the ‘revolution' aimed at corporations and government bodies. Anonymous are also still active, and it was rumoured in the past that members of Lulzsec are also members of this group.

Dino A. Dai Zovi an independent security consultant said “It looks like these sort of ‘hacktivist’ ideas are spreading and gaining popularity.” He said that Lulzsec appear to be stimulating the audience into mounting their own attacks, opening up the potential for more smaller, splintered groups across the globe.

Lulzsec are under investigation by many government enforcement agencies and one suspected member Ryan Cleary, a 19 year old from Essex, UK was arrested under suspicion of involvement with the group. Lulzsec are also under attack from rival groups who are trying to expose them to authorities.

American officials in key agencies have said that the attacks in recent weeks are more ‘nuisances' that ‘real security threats'. Obviously they are trying to diffuse the situation. One government offical said that Lulzsec's attacks had never even compromised any classified information.

Other security officials claim that the disbanding of Lulzsec might seem like a big deal, but it could be a ploy to get authorities to step back from their investigations and tracking of individuals. All it would take is one skilled member of Lulzsec to continue the attacks without a group name.

Kitguru says: Many claim that it will not make a difference, because Lulzsec have started something which seems to have inspired the underground community.

The post Have Lulzsec inspired something bigger? first appeared on KitGuru.]]>
https://www.kitguru.net/channel/slyvia/have-lulzsec-inspired-something-bigger/feed/ 0
DPS hacked by Lulzsec: law enforcement files stolen https://www.kitguru.net/channel/raymond-daily/dps-hacked-by-lulzsec-law-enforcement-files-stolen/ https://www.kitguru.net/channel/raymond-daily/dps-hacked-by-lulzsec-law-enforcement-files-stolen/#respond Fri, 24 Jun 2011 07:21:43 +0000 http://www.kitguru.net/?p=50328 High profile hacking group Lulzsec are in the news almost daily in recent weeks, and their latest target according to industry sources is the Arizona Department of Public Safety. Lulzsec hacked into the network and downloaded hundreds of law enforcement files, which they released. This is the latest in a long list of attacks by …

The post DPS hacked by Lulzsec: law enforcement files stolen first appeared on KitGuru.]]>
High profile hacking group Lulzsec are in the news almost daily in recent weeks, and their latest target according to industry sources is the Arizona Department of Public Safety. Lulzsec hacked into the network and downloaded hundreds of law enforcement files, which they released.

This is the latest in a long list of attacks by Lulzsec who have also targeted the CIA and the U.S. Senate recently. They said they targeted the DPS because Lulzec oppose Senate Bill 1070 which was created by Arizona Legislature. This law improves law enforcement officers abilities to arrest illegal immigrants. The law is on hold, pending a review by the U.S. Supreme court.

Lulzsec posted the DPS files on their own website, including personal information about enforcement officers. They also released documents which detailed many aspects of operations, with one detailed “cartel leader threatens deadly force on U.S. police.” They claim that the documents are generally related to U.S. Border Patrol and counter terrorism operations.

Lulzsec say they will release more documents every week in an effort to sabotage and embarrass authorities. Lulzsec said this information would be publicly posted “in an effort not just to reveal their racist and corrupt nature but to purposefully sabotage their efforts to terrorize communities fighting an unjust ‘war on drugs.' ”

The DPS have acknowledged the breach. Steve Harrison a spokesman confirmed last night that the system was indeed hacked earlier in the day.

Experts have been called in to secure the system and to prevent further breaches, although it appears the damage has already been done. Harrison said that the release of officers personal information is alarming. This information details the name of eight officers, mobile phone numbers, addresses and even spouses names and details.

He said “When you put out personal information, you don't know what kind of people will respond.”

Lulzsec also posted email accounts online, including passwords. They argue that some of the information is classified as ‘not for public distribution', even though the DPS said they didn't believe any sensitive information was stolen by the hacking organisation. The DPS shut down their website immediately.

“DPS is working to verify all user accounts, change all passwords and make sure everything is secure,” Sandeen said. “We have to validate that it is a legitimate hack and it's legitimate information.”

Lulzsec are growing in popularity, and their Twitter page has now more than 261,200 followers.

Kitguru says: According to industry insiders, due to the recent attacks by Lulzsec, many agencies and government bodies are calling in experts to reevaluate their security.

The post DPS hacked by Lulzsec: law enforcement files stolen first appeared on KitGuru.]]>
https://www.kitguru.net/channel/raymond-daily/dps-hacked-by-lulzsec-law-enforcement-files-stolen/feed/ 0
FBI on rampage to get Lulzsec https://www.kitguru.net/channel/dragan/fbi-on-rampage-to-get-lulzsec/ https://www.kitguru.net/channel/dragan/fbi-on-rampage-to-get-lulzsec/#respond Thu, 23 Jun 2011 09:02:31 +0000 http://www.kitguru.net/?p=50226 Lulzsec's recent high profile attacks have gained the attention of the FBI – who are now spending a lot of their resources trying to track and prosecute the organisation. In a series of raids, the agency targeted a datacentre in the US this week and walked away with a selection of hardware. The datacentre was …

The post FBI on rampage to get Lulzsec first appeared on KitGuru.]]>
Lulzsec's recent high profile attacks have gained the attention of the FBI – who are now spending a lot of their resources trying to track and prosecute the organisation.

In a series of raids, the agency targeted a datacentre in the US this week and walked away with a selection of hardware. The datacentre was operated by Swiss firm DigitalOne and their website is still offline, over 36 hours later. We aren't sure why they targeted DigitalOne as no association with Lulzsec has been made public.

Sergei Ostroumow has emailed some of his clients explaining the current situation “This problem is caused by the FBI, not our company,” he wrote.

“In the night FBI has taken 3 enclosures with equipment plugged into them, possibly including your server – we cannot check it.

“After FBI’s unprofessional ‘work’ we can not restart our own servers, that’s why our Web site is offline and support doesn’t work.”

The New York Times have published an article which states that the problem is so severe to the FBI that they are working with the CIA now and other law enforcement agencies in various countries to step up the hunt for members of Lulzsec.

The post FBI on rampage to get Lulzsec first appeared on KitGuru.]]>
https://www.kitguru.net/channel/dragan/fbi-on-rampage-to-get-lulzsec/feed/ 0
Lulzsec, what are their motives? https://www.kitguru.net/channel/carl/lulzsec-what-are-their-motives/ https://www.kitguru.net/channel/carl/lulzsec-what-are-their-motives/#comments Thu, 23 Jun 2011 07:58:32 +0000 http://www.kitguru.net/?p=50202 The hacking scene is a very complex territory to delve into. High profile group Lulzsec have been in the press in recent weeks for hacking into many corporations, such as Sony, as well as US government bodies. Behind the scenes however it appears there is more than a little friction right now between various individuals …

The post Lulzsec, what are their motives? first appeared on KitGuru.]]>
The hacking scene is a very complex territory to delve into. High profile group Lulzsec have been in the press in recent weeks for hacking into many corporations, such as Sony, as well as US government bodies.

Behind the scenes however it appears there is more than a little friction right now between various individuals and groups. One guy who appears to want the closure of Lulzsec is a chap called “th3 j35t3r.” He has an active Twitter stream which is filled with taunts and insults against Lulzsec.

By following the link, people are taken to the website of Karim Hijazi, the CEO of Unveillance. His business is a private botnet monitoring service which locates and confirms botnet infections in computer networks. On June 3rd Karim published a press release on his site which highlights a conversation he had with some members of Lulzsec after they targeted him.

(KARIM) So did we wrong you in some way, let’s get to the point?
(LULZ) <@Ninetales> If you wronged us, all of your affiliates would be crushed. Don’t worry, you’re in the good books. The point is a very crude word: extortion.
(LULZ) <@Ninetales> And what we’re both willing to agree upon that you sacrifice in return for our silence.
(LULZ) <@Ninetales> While I do get great enjoyment from obliterating whitehats from cyberspace, I can save this pleasure for other targets. Let’s just simplify: you have lots of money, we want more money.
(LULZ) <@Ninetales> Prepaid Visas, MoneyPaks, BitCoins, Liberty Reserve, WebMoney, the flavor of your choice. Naturally we’ll avoid PayPal.

Karim finishes the press release with some other details:

1. I have been able to protect the sensitive data which LulzSec was ultimately after. All they have stolen and publicly dumped are my personal and work emails.
2. I am now, and have been, in full cooperation with the FBI. In fact, I contacted the FBI and US-CERT immediately after I began receiving threats from LulzSec to request their assistance – and to explain the nature of the threat. I offered my full cooperation to the FBI in an effort to rectify the situation.
3. Unveillance is not a security company. We are a private botnet monitoring service – and a good one, which is why we were targeted. I do not provide security services to other companies. What I do provide clients with is the first zero false-positive analysis tool for identifying confirmed botnet infections in their computer networks.
4. I am not surprised by this attack; or the information dump on me; or their slanderous statements against me and my company. This is precisely what they threatened me with – in addition to other things, including allusions to physical harm to me and my family – if I did not cooperate with their demands.
5. I do not regret refusing to cooperate with LulzSec. My data is of national security importance. I could not and cannot, in good conscience, agree to release my botnet intelligence to an organization of hackers.

Lulzsec claim that they were deliberately trying to expose Karim to see if he would sell out. It all becomes rather confusing, although we can see from the events over the last couple of months that Lulzsec don't appear to be defrauding individuals by using credit card information they compromise from servers. Kitguru doesn't claim to know their thinking or what their motives really are and while their actions are illegal in many countries, they have yet to target any members of the public.

One thing is for sure, both Lulzsec and Anonymous are certainly on the hitlist for many of the government agencies. We wonder how long they can remain hidden from authorities. The recent attacks also have many high profile companies worrying about their security and perhaps some good can come from the attacks. After all we are pretty sure by the end of the year that Sony's networks will be a heck of a lot more secure than they were a few months ago.

Kitguru says: Do you agree with the actions of Anonymous and Lulzsec? Some insiders claim that certain individuals are actually members of both groups.

The post Lulzsec, what are their motives? first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/lulzsec-what-are-their-motives/feed/ 5
Have LulzSec been exposed online? https://www.kitguru.net/channel/carl/have-lulzsec-been-exposed-online/ https://www.kitguru.net/channel/carl/have-lulzsec-been-exposed-online/#respond Mon, 20 Jun 2011 07:24:06 +0000 http://www.kitguru.net/?p=49784 Team Web Ninjas have posted a blog online which is said to expose some members of Lulzsec, the underground hacking group who have targeted many businesses and government agencies in recent months. The blog, entitled lulzsecexposed.blogspot.com has received hundreds of thousands of hits over the weekend, and they even have a picture of the ‘leader …

The post Have LulzSec been exposed online? first appeared on KitGuru.]]>
Team Web Ninjas have posted a blog online which is said to expose some members of Lulzsec, the underground hacking group who have targeted many businesses and government agencies in recent months.

The blog, entitled lulzsecexposed.blogspot.com has received hundreds of thousands of hits over the weekend, and they even have a picture of the ‘leader of lulzSec'.

Team Web Ninjas say on the blog “If LulzSec can expose security holes, We can expose their holes, How about this for LULZ? – Team Web Ninjas” they add in a post “We have tried our best doxing LulzSec and keep doing it until we see them behind bars.”

According to the blog, there are connections between Anonymous and LulzSec, saying that some members are active in both groups.

Lulzsec have replied with the following statement:

“Dear Internets,

“Herro! Recently some of you may have seen “LulzSec exposed” logs floating around. We'd like the time to say this: LOL. Those logs are primarily from a channel called #pure-elite, which is /not/ the LulzSec core chatting channel. #pure-elite is where we gather potential backup/subcrew research and development battle fleet members, i.e. we were using that channel only to recruit talent for side-operations.

“Our core chatting channel remains unaffected. Our core LulzSec team is at full strength. The Lulz Boat sails stronger than ever, nice try though.

“TL;DR we are too sexy to be sunk, hacking continues as usual, u mad bros?”

Kitguru says: The drama continues.

The post Have LulzSec been exposed online? first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/have-lulzsec-been-exposed-online/feed/ 0
Lulzsec post details of 62,000 hacked accounts online https://www.kitguru.net/channel/slyvia/lulzsec-post-details-of-62000-hacked-accounts-online/ https://www.kitguru.net/channel/slyvia/lulzsec-post-details-of-62000-hacked-accounts-online/#comments Fri, 17 Jun 2011 08:22:25 +0000 http://www.kitguru.net/?p=49579 It seems we can't go a day without mentioning Lulzsec, as the proficient hacking group continue to compromise websites and online businesses. Yesterday they posted the information of 62,000 hacked email accounts and the information relating to passwords makes for some interesting reading indeed. Looking through the list last night we noticed at the password …

The post Lulzsec post details of 62,000 hacked accounts online first appeared on KitGuru.]]>
It seems we can't go a day without mentioning Lulzsec, as the proficient hacking group continue to compromise websites and online businesses.

Yesterday they posted the information of 62,000 hacked email accounts and the information relating to passwords makes for some interesting reading indeed.

Looking through the list last night we noticed at the password ‘123456' was one of the most common with 568 people deciding it was a great way to protect their account. This was followed up by ‘123456789' with 185 people using it. There is a common joke that people use ‘password' as their password, but incredibly there were actually 135 people who used it. Hard to believe, but true.

It also seems that the modern day female fixation with pale skinned ‘boy band' style vampires is a password choice, with 40 people using the term ‘vampire' or ‘vamp' to protect their accounts. 69 people called themselves ‘king' and 85 called themselves ‘queen'.

135 people used the term ‘sex' in their password and ‘romance' was used 88 times. The list was available for download yesterday from mediafire, as Lulzsec decided to share all the information in a 2 meg text file, but it has since been removed.

No one is yet fully aware of where the account information came from, but many have said that they maybe associated with ebay and paypal accounts. Which is not a good sign, if true.

Kitguru says: We suggest that everyone just change all their passwords today, to be extra safe.

The post Lulzsec post details of 62,000 hacked accounts online first appeared on KitGuru.]]>
https://www.kitguru.net/channel/slyvia/lulzsec-post-details-of-62000-hacked-accounts-online/feed/ 3
Lulzsec take down CIA site https://www.kitguru.net/channel/simon/lulzsec-take-down-cia-site/ https://www.kitguru.net/channel/simon/lulzsec-take-down-cia-site/#respond Thu, 16 Jun 2011 07:22:04 +0000 http://www.kitguru.net/?p=49456 Lulzsec, one of the highest profile hacking groups have continued their campaign of site takedowns by breaching the US Central Intelligence Agencies homepage. Lulzsec announced the attack with a comment on their twitter page which read “Tango down – cia.gov – for the lulz.”. Lulzsec seem to be unstoppable right now taking down many well …

The post Lulzsec take down CIA site first appeared on KitGuru.]]>
Lulzsec, one of the highest profile hacking groups have continued their campaign of site takedowns by breaching the US Central Intelligence Agencies homepage.

Lulzsec announced the attack with a comment on their twitter page which read “Tango down – cia.gov – for the lulz.”. Lulzsec seem to be unstoppable right now taking down many well known company websites, from gaming organisations to government entities.

The hack has caused a little hostility in the hacking community with hacker ‘th3j35t3r' (the jester) – a pro American ‘hacktivist' issuing a warning to Lulzsec

He said:

@lulzsec – re: your last hit. Gloves off. Expect me. My silence is not an indication of weakness, as your mouth is an indication of yours.

Lulzsec seem to be extremely well organised and pretty much unstoppable right now, with no authorities being able to trace the source of their attacks. By hacking the CIA they are issuing a statement, which is saying that no one is off limits in their current campaign.

Lulzsec have also set up phone lines 614-LULZSEC and 732-993-7703, which are getting thousands of calls every day. They are answering some of the calls asking the callers questions for prizes or replying in french accents. The phone calls however are also being put to more devious attacks, causing phone denial of service attacks against some businesses.

Kitguru says: Are Lulzsec unstoppable?

The post Lulzsec take down CIA site first appeared on KitGuru.]]>
https://www.kitguru.net/channel/simon/lulzsec-take-down-cia-site/feed/ 0
Lulzsec take down game websites including EVE Online https://www.kitguru.net/channel/carl/lulzsec-take-down-game-websites-including-eve-online/ https://www.kitguru.net/channel/carl/lulzsec-take-down-game-websites-including-eve-online/#comments Wed, 15 Jun 2011 08:20:32 +0000 http://www.kitguru.net/?p=49326 Lulzsec have been in the press a lot recently, targeting several high profile agencies. Their latest attacks this week have been aimed at gaming companies such as Minecraft and Eve Online. LulzSec said they took down the Web site for CCP games EVE online and also Escapist Magazine. They also aimed attacks at monitoring firm …

The post Lulzsec take down game websites including EVE Online first appeared on KitGuru.]]>
Lulzsec have been in the press a lot recently, targeting several high profile agencies. Their latest attacks this week have been aimed at gaming companies such as Minecraft and Eve Online.

LulzSec said they took down the Web site for CCP games EVE online and also Escapist Magazine. They also aimed attacks at monitoring firm FinFisher, adding on their twitter page “because apparently they sell monitoring software to the government or some s**t like that.”

EVE Online was one of the higher profile attacks, with many gamers still playing the game online. They issued a statement “EVE Online and related services experienced an Internet attack. We have taken them down as a security precaution. The security of your information is of upmost import to us. We will provide more info as it becomes available.”

Lulzsec confirmed they were involved and said they “wiped out the login server for Eve Online.” while also taking down the web site for the company.

Minecraft developer Markus Persson tweeted “Looks like we're back up.. I just hope it lasts!”

Escapist Magazine have yet to issue any statement but Lulzsec said they attacked them “with around 0.4% of our total ammunition,” saying they wanted to “see what their admins are made of.”

Kitguru says: Who are next?

The post Lulzsec take down game websites including EVE Online first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/lulzsec-take-down-game-websites-including-eve-online/feed/ 1
Senate site is hacked by Lulzsec https://www.kitguru.net/channel/simon/senate-site-is-hacked-by-lulzsec/ https://www.kitguru.net/channel/simon/senate-site-is-hacked-by-lulzsec/#respond Tue, 14 Jun 2011 07:36:31 +0000 http://www.kitguru.net/?p=49177 Lulzsec, a well known hacking group managed to break into the Senate website at the weekend. US officials have ordered a security review into the incident to ensure it doesn't happen again. Lulzsec are a high profile group of hackers who have previously targeted Nintendo, Sony and Fox News. An official for the Senate website …

The post Senate site is hacked by Lulzsec first appeared on KitGuru.]]>
Lulzsec, a well known hacking group managed to break into the Senate website at the weekend. US officials have ordered a security review into the incident to ensure it doesn't happen again.

Lulzsec are a high profile group of hackers who have previously targeted Nintendo, Sony and Fox News. An official for the Senate website said the hack was ‘inconvenient' but said that the breach did not compromise the security of the staff. The files that were taken were posted online.

Officials are looking into the breach and analysing the other sites hosted on senate.gov. Senate Deputy Sergeant-at-Arms Martina Bradford said in a statement issued to the press “Specifically, there is no individual user account information on the server supporting senate.gov that could have been compromised.”

Lulzsec posted the files online saying “”We don't like the US government very much. This is a small, just-for-kicks release of some internal data from Senate.gov – is this an act of war, gentlemen? Problem?”

The US government said that it is considering cyber attacks an ‘act of war' and said they reserved the right to respond to attacks with conventional means if they were found to have been orchestrated by a nation state.

Kitguru says: Lulzsec challenging the US authorities.

The post Senate site is hacked by Lulzsec first appeared on KitGuru.]]>
https://www.kitguru.net/channel/simon/senate-site-is-hacked-by-lulzsec/feed/ 0
Sony confirm they were hacked again by Lulzsec – says sorry https://www.kitguru.net/channel/raymond-daily/sony-confirm-they-were-hacked-again-by-lulzsec-says-sorry/ https://www.kitguru.net/channel/raymond-daily/sony-confirm-they-were-hacked-again-by-lulzsec-says-sorry/#comments Sat, 04 Jun 2011 08:07:14 +0000 http://www.kitguru.net/?p=47939 Kitguru reported earlier this week that Lulzsec, a group of skilled hackers, claimed to have compromised Sony servers. Last night Sony confirmed this was true, saying they were the victim, yet again, of an attack. Michael Lynton chairman and chief executive officer of Sony Pictures Entertainment and Amy Pascal, co-chairman of Sony Pictures Entertainment said …

The post Sony confirm they were hacked again by Lulzsec – says sorry first appeared on KitGuru.]]>
Kitguru reported earlier this week that Lulzsec, a group of skilled hackers, claimed to have compromised Sony servers. Last night Sony confirmed this was true, saying they were the victim, yet again, of an attack.

Michael Lynton chairman and chief executive officer of Sony Pictures Entertainment and Amy Pascal, co-chairman of Sony Pictures Entertainment said “The cybercrime wave that has affected Sony companies and a number of government agencies, businesses and individuals in recent months has hit Sony Pictures as well.”

They added “Yesterday afternoon a group of criminal hackers known as “LulzSec” claimed to have breached some of our websites. We have confirmed that a breach has occurred and have taken action to protect against further intrusion. We also retained a respected team of experts to conduct the forensic analysis of the attack, which is ongoing. In addition, we have contacted the U.S. Federal Bureau of Investigation and are working with them to assist in the identification and apprehension of those responsible for this crime.”

By now we would assume that many people have lost faith in Sony to keep any proficient level of security and all they can say, yet again is “We deeply regret and apologize for any inconvenience caused to consumers by this cybercrime.”

What is compromised this time? Lulzsec say they infiltrated the Sonypictures.com website and gained access to information such as email addresses, home addresses, passwords and even birth dates of over 1,000,000 user accounts. The kicker? Lulzsec said that the data wasn't even encrypted.

“…every bit of data we took wasn’t encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it’s just a matter of taking it. This is disgraceful and insecure: they were asking for it.”

Sony are reeling from a continual barrage of attacks, and this is the latest in a long line of security issues for the Japanese electronics giant.

KitGuru says: The company has created a new position to help with the continual breaches, ‘Chief Information Security Officer' – and we pity their workload right now.

The post Sony confirm they were hacked again by Lulzsec – says sorry first appeared on KitGuru.]]>
https://www.kitguru.net/channel/raymond-daily/sony-confirm-they-were-hacked-again-by-lulzsec-says-sorry/feed/ 7
Sony hacked yet again, info of 1 million customers compromised https://www.kitguru.net/channel/carl/sony-hacked-yet-again-info-of-1-million-customers-compromised/ https://www.kitguru.net/channel/carl/sony-hacked-yet-again-info-of-1-million-customers-compromised/#respond Fri, 03 Jun 2011 06:51:22 +0000 http://www.kitguru.net/?p=47764 Sony's miseries continue with the latest news that they have been hacked, again, losing the information of more than 1 million customers. Yesterday we reported that LulzSec, another hacking group had said they broke into Sony's servers. These claims have been verified and it highlights that Sony are not yet secure. LulzSec have attacked U.S. …

The post Sony hacked yet again, info of 1 million customers compromised first appeared on KitGuru.]]>
Sony's miseries continue with the latest news that they have been hacked, again, losing the information of more than 1 million customers. Yesterday we reported that LulzSec, another hacking group had said they broke into Sony's servers. These claims have been verified and it highlights that Sony are not yet secure.

LulzSec have attacked U.S. PBS television and Fox.com in the past and they have published the names, birth dates, addresses, emails and phone numbers of thousands of people who had entered contests promoted by Sony.

LulzSec issued a statement “From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks?”

Sony Broadcast HQ

The security breach couldn't come at a worse time for Sony, who have been reeling in recent weeks, after multiple attacks to their networks across the globe. Sony have said they are looking into the breach and have not yet issued anymore details. Sony shares have fallen 0.3 percent today. Reuters have confirmed the authenticity of the data LulzSec published, confirming it is true.

John Bumgarner, the chief technology officer for the U.S. Cyber Consequences unit, a non profit group who analyse web threats said he wasn't surprised that Sony had been compromised. He said their systems were unsecure and that he had identified more vulnerabilities, even up to last weekend when it should have been tightened up.

LulzSec are another high profile hacking group who have targeted several large businesses in recent months. They have broken into Fox.com websites and published data about contestants for upcoming show ‘X Factor'. They also defaced the U.S. PBS television network websites, posting stolen data from their servers.

KitGuru says: Sony will need to issue statements soon regarding the LulzSec attacks, as they have been under pressure for ‘slow' actions after the recent Playstation Network hacks.

The post Sony hacked yet again, info of 1 million customers compromised first appeared on KitGuru.]]>
https://www.kitguru.net/channel/carl/sony-hacked-yet-again-info-of-1-million-customers-compromised/feed/ 0
LulzSec target Sony claiming to have control of network https://www.kitguru.net/channel/darkliquid/lulzsec-target-sony-saying-they-have-control-of-network/ https://www.kitguru.net/channel/darkliquid/lulzsec-target-sony-saying-they-have-control-of-network/#comments Thu, 02 Jun 2011 08:49:34 +0000 http://www.kitguru.net/?p=47609 UK newsite TechEye have an interesting story running this morning which claims that Hacking group LulzSec have control of Sony's network. LulzSec's twitter account had some tweets saying that information has already been stolen from the Sony servers as part of an ongoing campaign. “Hey @Sony, you know we're making off with a bunch of …

The post LulzSec target Sony claiming to have control of network first appeared on KitGuru.]]>
UK newsite TechEye have an interesting story running this morning which claims that Hacking group LulzSec have control of Sony's network.

LulzSec's twitter account had some tweets saying that information has already been stolen from the Sony servers as part of an ongoing campaign.

“Hey @Sony, you know we're making off with a bunch of your internal stuff right now and you haven't even noticed? Slow and steady, guys,” LulzSec tweeted. Obviously right now Sony have neither confirmed or denied this, but if true then it would be a disaster for the electronics giant, who have been reeling for the last month after various attacks on parts of their network.

LulzSec did say on Twitter that they were not behind the huge PSN hack which targeted 100 million user accounts. They did state that Sony will be attacked further however as their high profile ‘attention' makes them a viable target.

KitGuru says: We cannot confirm or deny the story, and it could be the case of just another hacking group vying for attention.

The post LulzSec target Sony claiming to have control of network first appeared on KitGuru.]]>
https://www.kitguru.net/channel/darkliquid/lulzsec-target-sony-saying-they-have-control-of-network/feed/ 2