LulzSec Secutities(a hacking group which hacked sony

0 views
Skip to first unread message

Geogen George

unread,
Jul 7, 2011, 9:54:40 AM7/7/11
to iscf2010, cssngce

Lulz Security, also known as LulzBoat, has allegedly targeted numerous government and corporate websites. It reportedly attacked both the CIA and the Senate. In addition, the LulzSec group attacked Sony BMG, Nintendo.com , Sonypictures.com, PBS.org, Fox.com, US X Factor contestant database, Sonymusic.co.jp, InfraGard, and other corporations. Responsibility for the attacks is usually declared on Twitter.

In the past, according to MSNBC, LulzSec’s attacks were little more than noisome pranks that did not inflict serious damage, but in a message about the SOCA op they declared the intention to increase the severity of their attacks. “Top priority is to steal and leak any classified government information, including email spools and documentation. Prime targets are banks and other high-ranking establishments,” LulzSec announced.

 
 
 
 
 
 
Hacking outfit LulzSec said it penetrated servers belonging to the Arizona Department of Public Safety (DPS) and has posted data including, email correspondence and staff data on file-sharing sites.

The DPS confirmed its systems had been hacked yesterday. Steve Harrison said at least eight officers' personal information was stolen and leaked, including addresses and mobile phone numbers.

"When you put out personal information, you don't know what kind of people will respond," he said. E-mail accounts passwords were also posted online he said.

LulzSec said it targeted Arizona because of its tough immigration law "and the racial profiling anti-immigrant police state that is Arizona".

It said its haul includes: "hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement."

The outfit said it will release "more classified documents and embarrassing personal details of military and law enforcement" over the coming weeks.

Meanwhile, LulzSec web site itself appears to have been briefly taken offline in an operation claimed by ex-US military man turned pro-establishment hacker The Jester. He said the Lulz Security site is hosted on servers in Malaysia.

"www.lulzsecurity.com - TANGO DOWN - 'this is General Hummel, from Alcatraz, Out' - http://t.co/oNm29Pv for the lulz," he wrote. The link is to a Pastebin posting that appears to contain details of LulzSec IRC chat logs

 
 
 
Latest News: hackers are using www.pastbin.com

to send msgs each other in the form of pics and encryped texts.....
 
if some one can decrypt whts the IRC encypted msgs they send through   http://pastebin.com/... u are 2moros hacker....

read this... http://www.net-security.org/secworld.php?id=11231

PasteBin has released sketchy information casting a suspicious light on LulzSec. A former Marine in military intelligence operative going by the name “Nakomis” is allegedly a member of the group.

PasteBin has not offered any conclusive evidence that “Nakomis” is indeed a military intelligence operative, but considering the government’s full-court press to pass legislation seriously curtailing the internet in an effort to shut down the alternative media it cannot be ruled out.(http://www.infowars.com/are-lulzsec-hacker-attacks-the-work-of-military-intelligence/)

 
 

 
Regards,
       Geogen George
 
|S R M University | Potherri, | Chennai, India
|C M.Tech| B Information Security & Cyber Forensics,

Reply all
Reply to author
Forward
0 new messages