50 Daysof Lulz
50 Daysof Lulz
50 Daysof Lulz
several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. The group also clai med responsibility for taking the CIA website offline.[2] Some security professi onals have commented that LulzSec has drawn attention to insecure systems and th e dangers of password reuse.[3] It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks . One of the founders of LulzSec was a computer security specialist who used the online moniker Sabu. The man accused of being Sabu has helped law enforcement t rack down other members of the organization as part of a plea deal. At least fou r associates of LulzSec were arrested in March 2012 as part of this investigatio n. British authorities had previously announced the arrests of two teenagers the y allege are LulzSec members T-flow and Topiary. At just after midnight (BST, UT+01) on 26 June 2011, LulzSec released a "50 days of lulz" statement, which they claimed to be their final release, confirming th at LulzSec consisted of six members, and that their website is to be shut down.[ 1] This breaking up of the group was unexpected.[4] The release included account s and passwords from many different sources. Despite claims of retirement, the g roup committed another hack against newspapers owned by News Corporation on 18 J uly, defacing them with false reports regarding the death of Rupert Murdoch. The group helped launch Operation AntiSec, a joint effort involving LulzSec, Anonym ous, and other hackers. Contents 1 Background and history 2 Former members and associates 3 Ideology 4 Initial targets 5 Corporate attacks 6 Government-focused activities 7 Operation Anti-Security 8 Denied attacks 9 Hacker actions against LulzSec 10 Law enforcement response 11 See also 12 References 13 External links Background and history A federal indictment against members contends that, prior to forming the hacking collective known as LulzSec, the six members were all part of another collectiv e called Internet Feds, a group in rivalry with Anonymous. Under this name, the group attacked websites belonging to Fine Gael, HBGary, and Fox Broadcasting Com pany. This includes the alleged incident in which e-mail messages were stolen fr om HBGary accounts. In May 2011, following the publicity surrounding the HBGary hacks, six members of Internet Feds founded the group LulzSec.[5] The group's first recorded attack was against Fox.com's website,[6][7] though th ey still may have been using the name Internet Feds at the time.[5] It claimed r esponsibility for leaking information, including passwords, altering several emp loyees' LinkedIn profiles, and leaking a database of X Factor contestants contai ning contact information of 73,000 contestants.[6] They claimed to do so because the rapper Common had been referred to as "vile" on air.[8] LulzSec drew its name from the neologism "lulz", (from lol), "laughing out loud" , which represents laughter, and "Sec", short for "Security". The Wall Street Jo urnal characterized its attacks as closer to Internet pranks than serious cyber-
warfare,[9] while the group itself claimed to possess the capability of stronger attacks.[10] It gained attention in part due to its brazen claims of responsibi lity and lighthearted taunting of corporations that were hacked. It frequently r eferred to Internet memes when defacing websites. The group emerged in May 2011, and successfully attacked websites of several major corporations.[9] It special ized in finding websites with poor security, stealing and posting information fr om them online. It used well-known straightforward methods, such as SQL injectio n, to attack its target websites.[11] Several media sources have described their tactics as grey hat hacking.[11][12][13] Members of the group may have been inv olved in a previous attack against the security firm HBGary.[14] The group used the motto "Laughing at your security since 2011!" and its website , created in June 2011, played the theme from The Love Boat.[9] It announced its exploits via Twitter and its own website, often accompanied with lighthearted A SCII art drawings of boats. Its website also included a Bitcoin donation link to help fund its activities.[15] Ian Paul of PC World wrote that, "As its name sug gests, LulzSec claims to be interested in mocking and embarrassing companies by exposing security flaws rather than stealing data for criminal purposes."[16] Th e group was also critical of white hat hackers, claiming that many of them have been corrupted by their employers.[9] Some in the security community contended that the group raised awareness of the widespread lack of effective security against hackers.[17] They were credited wi th inspiring LulzRaft, a group implicated in several high-profile website hacks in Canada.[18] In June 2011 the group took suggestions for sites to hit with denial-of-service attacks.[19] The group redirected telephone numbers to different customer suppor t lines, including the line for World of Warcraft, magnets.com, and the FBI Detr oit office. The group claimed this sent five to 20 calls per second to these sou rces, overwhelming their support officers.[20] On 24 June 2011, The Guardian rel eased leaked logs of one of the group's IRC chats, revealing that the core group was a small group of hackers with a leader Sabu who exercised large control ove r the group's activities. It also revealed that the group had connections with A nonymous, though was not formally affiliated with it. Some LulzSec members had o nce been prominent Anonymous members, including member Topiary.[21] At just after midnight (GMT) on 26 June 2011, LulzSec released a "50 days of lul z" statement, which they claimed to be their final release, confirming that Lulz Sec consisted of six members, and that their website was to be taken down.[22] T he group claimed that they had planned to be active for only fifty days from the beginning.[23] "We're not quitting because we're afraid of law enforcement. The press are getting bored of us, and we're getting bored of us," a group member s aid in an interview to The Associated Press.[24] Members of the group were repor ted to have joined with Anonymous members to continue the AntiSec operation.[25] However, despite claiming to retire, the group remained in communication as it attacked the websites of British newspapers The Times and The Sun on 18 July, le aving a false story on the death of owner Rupert Murdoch.[26] Former members and associates LulzSec consisted of seven core members.[22] The online handles of these seven w ere established through various attempts by other hacking groups to release pers onal information of group members on the internet, leaked IRC logs published byT he Guardian, and through confirmation from the group itself.[27] Sabu One of the group's founders, who seemed to act as a kind of leader for the group, Sabu would often decide what targets to attack next and who could par ticipate in these attacks. He may have been part of the Anonymous group that hac ked HBGary. Various attempts to release his real identity have claimed that he i s an information technology consultant with the strongest hacking skills of the
group and a knowledge of the Python programming language. It was thought that Sa bu was involved in the media outrage cast of 2010 using the skype "anonymous.sab u"[27] Sabu was arrested in June 2011 and identified as a 29-year old unemployed man from New York s Lower East Side. On 15 August, he pleaded guilty to several h acking charges and agreed to cooperate with the FBI. Over the following seven mo nths he successfully unmasked the other members of the group.[28][29] Sabu was i dentified by Backtrace Security as Hector Montsegur on 11 March 2011 in a PDF pu blication named "Namshub." [30] LulzSec brought down by own leader. Topiary Topiary was also a suspected former member of the Anonymous, where h e used to perform media relations, including hacking the website of the Westboro Baptist Church during a live interview.[31][32] Topiary ran the LulzSec Twitter account on a daily basis; following the announcement of LulzSec's dissolution, he deleted all the posts on his Twitter page, except for one, which stated: "You cannot arrest an idea".[27][33] Police arrested a man from Shetland, United Kin gdom suspected of being Topiary on 27 July 2011.[34] The man was later identifie d as Jake Davis and was charged with five counts, including unauthorized access of a computer and conspiracy.[35] He was indicted on conspiracy charges on 6 Mar ch 2012. Kayla/KMS Ryan Ackroyd of London, and another unidentified individual known as "lol" or "Shock.ofgod" in LulzSec chat logs. Kayla owned a botnet used by the group in their distributed denial-of-service attacks. The botnet is reported to have consisted of about 800,000 infected computer servers. Kayla was involved i n several high-profile attacks under the group "gn0sis". Kayla also may have par ticipated in the Anonymous operation against HBGary. Kayla reportedly wiretapped 2 CIA agents in an anonymous operation. Kayla was also involved in the 2010 med ia outrage under the Skype handle "Pastorhoudaille".[27] Kayla is suspected of h aving been something of a deputy to Sabu and to have found the vulnerabilities t hat allowed LulzSec access to the United States Senate systems. One of the men b ehind the handle Kayla was identified as Ryan Ackroyd of London, arrested, and i ndicted on conspiracy charges on 6 March 2012.[32][36] Tflow (Real name: Mustafa Al-Bassam) The fourth founding member of the group identified in chat logs, attempts to identify him have labelled him a PHP coder , web developer, and performer of scams on PayPal. The group placed him in charg e of maintenance and security of the group's website lulzsecurity.com.[27] Londo n Metropolitan Police announced the arrest of a 16-year-old hacker going by the handle Tflow on 19 July 2011.[32][37] Avunit He is one of the core seven members[citation needed] of the group, bu t not a founding member. He left the group after their self-labelled "Fuck the F BI Friday". He was also affiliated with Anonymous AnonOps HQ.[27] Avunit is the only one of the core seven members that has not been identified. Pwnsauce Pwnsauce joined the group around the same time as Avunit and became one of its core members.[27] He was identified as Darren Martyn of Ireland and was indicted on conspiracy charges on 6 March 2012. The Irish national worked as a local chapter leader for the Open Web Application Security Project, resigning one week before his arrest.[38] Palladium Identified as Donncha O'Cearbhaill of Ireland, he was indicted on conspiracy on 6 March 2012.[5][32] Effx101 Identified as Anthony Theard known to be involved with the groups so cial engineering and anti-sec Anarchaos Identified as Jeremy Hammond of Chicago, he was arrested on access device fraud and hacking charges. He was also charged with a hacking attack on the U.S. security company Stratfor in December 2011. He is said to be a member o f Anonymous.[28] joepie91 The handle used by Sven Slootweg of the Netherlands, a leading acti vist within Anonymous and owner of AnonNews.org.[39] joepie91 is charted as the most active member of the LulzSec IRC channel, and core members of LulzSec inter acted with him more often than with each other, but he is not known to have dire ctly participated in any of LulzSec's hacking operations.[40] Ryan Cleary, who sometimes used the handle ViraL. Cleary has, to date, faced the most severe sentence of any hackers associated with LulzSec, 32 months in r
elation to attacks against the US Air Force and others.[41] Other members still may be active as to this time, they will not be identified. Ideology . /$$ /$$ /$$$$$$ .| $$ | $$ /$$__ $$ .| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$ .| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/ .| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$ .| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$ .| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$ .|________/ \______/ |__/|________/ \______/ \_______/ \_______/ //Laughing at your security since 2011! + __ )| ________________________.------,_ _ _/o|_____/ ,____________.__;__,__,__,__,_Y...:::---===````// |==========\ ; ; ; ; ; \__,__\__,_____ --__,-.\ OFF (( `----------|__,__/__,__/__/ )=))~(( '-\ THE \\ \ ==== \ \\~~\\ \ PIGS \\ `| === | ))~~\\ ```"""=,)) | === | |'---') / ==== / `=====' /------/
An ASCII graphic used by the group in its Chinga La Migra torrent,[42] an associ ated statement,[43] and also appearing in press coverage.[44] LulzSec did not appear to hack for financial profit,[45] claiming their main mot ivation was to have fun by causing mayhem.[46] They did things "for the lulz" an d focused on the possible comedic and entertainment value of attacking targets.[ 47] The group occasionally claimed a political message. When they hacked PBS, th ey stated they did so in retaliation for what they perceived as unfair treatment of Wikileaks in a Frontline documentary entitled WikiSecrets. A page they inser ted on the PBS website included the title "FREE BRADLEY MANNING. FUCK FRONTLINE! "[48] The 20 June announcement of "Operation Anti-Security" contained justificat ion for attacks on government targets, citing supposed government efforts to "do minate and control our Internet ocean" and accusing them of corruption and breac hing privacy.[49] The news media most often described them as grey hat hackers.[ 11][46] Karim Hijazi, CEO of security company Unveillance, accused the group of blackmai ling him by offering not to attack his company or its affiliates in exchange for money.[50] LulzSec responded by claiming that Hijazi offered to pay them to att ack his business opponents and that they never intended to take any money from h im.[51] LulzSec has denied responsibility for misuse of any of the data they bre ached and released. Instead, they placed the blame on users who reused passwords on multiple websites and on companies with inadequate security in place.[52] In June 2011, the group released a manifesto outlining why they performed hacks and website takedowns, reiterating that "we do things just because we find it en tertaining" and that watching the results can be "priceless".[53] They also clai med to be drawing attention to computer security flaws and holes. They contended that many other hackers exploit and steal user information without releasing th e names publicly or telling people they may possibly have been hacked. LulzSec s aid that by releasing lists of hacked usernames or informing the public of vulne rable websites, it gave users the opportunity to change names and passwords else
where that might otherwise have been exploited, and businesses would be alarmed and would upgrade their security.[53] The group's latest attacks have had a more political tone. They claimed to want to expose the "racist and corrupt nature" of the military and law enforcement. T hey have also expressed opposition to the War on Drugs.[54] Lulzsec's Operation Anti-Security was characterized as a protest against government censorship and m onitoring of the internet.[55] In a question and answer session with BBC Newsnig ht, LulzSec member Whirlpool (AKA: Topiary) said, "Politically motivated ethical hacking is more fulfilling". He claimed the loosening of copyright laws and the rollback of what he sees as corrupt racial profiling practices as some of the g roup's goals.[56] Initial targets The group's first attacks came in May 2011. Their first recorded target was Fox. com, which they retaliated against after they called Common, a rapper and entert ainer, "vile" on the Fox News Channel. They leaked several passwords, LinkedIn p rofiles, and the names of 73,000 X Factor contestants. Soon after on 15 May, the y released the transaction logs of 3,100 Automated Teller Machines in the United Kingdom.[8][47] In May 2011, members of Lulz Security gained international atte ntion for hacking into the American Public Broadcasting System (PBS) website. Th ey stole user data and posted a fake story on the site which claimed that Tupac Shakur and Biggie Smalls were still alive and living in New Zealand. In the afte rmath of the attack, CNN referred to the responsible group as the "Lulz Boat".[5 7] Lulz Security claimed that some of its hacks, including its attack on PBS, were motivated by a desire to defend WikiLeaks and Bradley Manning.[58] A Fox News re port on the group quoted one commentator, Brandon Pike, who claimed that Lulz Se curity was affiliated with the hacktivist group Anonymous. Lulz Security claimed that Pike had actually hired it to hack PBS. Pike denied the accusation and cla imed it was leveled against him because he said Lulz Security was a splinter of Anonymous.[59] In June 2011, members of the group claimed responsibility for an attack against Sony Pictures that took data that included "names, passwords, e-mail addresses, home addresses and dates of birth for thousands of people."[60] The group claime d that it used a SQL injection attack,[61] and was motivated by Sony's legal act ion against George Hotz for jailbreaking into the PlayStation 3. The group claim ed it would launch an attack that would be the "beginning of the end" for Sony.[ 62] Some of the compromised user information was subsequently used in scams.[63] The group claimed to have compromised over 1,000,000 accounts, though Sony clai med the real number was around 37,500.[64] Corporate attacks Lulz Security attempted to hack into Nintendo, but both the group and Nintendo i tself report that no particularly valuable information was found by the hackers. [65] LulzSec claimed that it did not mean to harm Nintendo, declaring: "We're no t targeting Nintendo. We like the N64 too much we sincerely hope Nintendo plugs the gap."[66] On 11 June, reports emerged that LulzSec hacked into and stole user information from the pornography website www.pron.com. They obtained and published around 26 ,000 e-mail addresses and passwords. Among the information stolen were records o f two users who subscribed using email addresses associated with the Malaysian g overnment, three users who subscribed using United States military email address es and 55 users who LulzSec claimed were administrators of other adult-oriented websites. Following the breach, Facebook locked the accounts of all users who ha d used the published e-mail addresses, and also blocked new Facebook accounts op ened using the leaked e-mail addresses, fearing that users of the site would get
hacked after LulzSec encouraged people to try and see if these people used iden tical user name and password combinations on Facebook as well.[67] LulzSec hacked into the Bethesda Game Studios network and posted information tak en from the network onto the Internet, though they refrained from publishing 200 ,000 compromised accounts.[68] LulzSec posted to Twitter regarding the attack, " Bethesda, we broke into your site over two months ago. We've had all of your Bri nk users for weeks, Please fix your junk, thanks!"[69] On 14 July 2012, LulzSec took down four websites by request of fans as part of t heir "Titanic Take-down Tuesday". These websites were Minecraft, League of Legen ds, The Escapist, and IT security company FinFisher.[70] They also attacked the login servers of the massively multiplayer online game EVE Online, which also di sabled the game's front-facing website, and the League of Legends login servers. Most of the takedowns were performed with distributed denial-of-service attacks .[71] On 15 June, LulzSec took down the main server of S2 Games' Heroes of Newer th as another phone request. They claimed, "Heroes of Newerth master login serve r is down. They need some treatment. Also, DotA is better."[72] On 16 June, LulzSec posted a random assortment of 62,000 emails and passwords to MediaFire. LulzSec stated they released this in return for supporters flooding the 4chan /b/ board.[73] The group did not say what websites the combinations we re for and encouraged followers to plug them into various sites until they gaine d access to an account. Some reported gaining access to Facebook accounts and ch anging images to sexual content and others to using the Amazon.com accounts of o thers to purchase several books.[74] Writerspace.com, a literary website, later admitted that the addresses and passwords came from users of their site.[75] Government-focused activities LulzSec claimed to have hacked local InfraGard chapter sites, a non-profit organ ization affiliated with the FBI.[9] The group leaked some of InfraGard member emails and a database of local users.[76] The group defaced the website posting t he following message, "LET IT FLOW YOU STUPID FBI BATTLESHIPS", accompanied with a video. LulzSec posted: "It has come to our unfortunate attention that NATO and our good friend Barr ack Osama-Llama 24th-century Obama [sic] have recently upped the stakes with reg ard to hacking. They now treat hacking as an act of war. So, we just hacked an F BI affiliated website (Infragard, specifically the Atlanta chapter) and leaked i ts user base. We also took complete control over the site and defaced it [...]." [77] On 9 June, LulzSec sent an email to the administrators of the British National H ealth Service, informing them of a security vulnerability discovered in NHS syst ems. LulzSec stated that they did not intend to exploit this vulnerability, sayi ng in the email that "We mean you no harm and only want to help you fix your tec h issues."[78] On 13 June, LulzSec released the e-mails and passwords of a number of users of s enate.gov, the website of the United States Senate.[79] The information released also included the root directory of parts of the website. LulzSec stated, "This is a small, just-for-kicks release of some internal data from senate.gov is thi s an act of war, gentlemen? Problem?" referencing a recent statement by the Pent agon that some cyberattacks could be considered an act of war. No highly sensiti ve information appears in the release.[80] On 15 June, LulzSec launched an attack on www.cia.gov, the public website of the United States Central Intelligence Agency, taking the website offline with a di stributed denial-of-service attack.[81] The website was down from 5:48 pm to 8:0 0 pm eastern time.[82]
On 2 December, an offshoot of LulzSec calling itself LulzSec Portugal, attacked several sites related to the government of Portugal. The websites for the Bank o f Portugal, the Assembly of the Republic, and the Ministry of Economy, Innovatio n and Development all became unavailable for a few hours.[83] Operation Anti-Security Main article: Operation AntiSec On 20 June, the group announced it had teamed up with Anonymous for "Operation A nti-Security". They encouraged supporters to hack into, steal, and publish class ified government information from any source while leaving the term "Antisec" as evidence of their intrusion. Also listed as potential targets were major banks. [49] USA Today characterized the operation as an open declaration of cyberwarfar e against big government and corporations.[84] Their first target of the operati on was the Serious Organised Crime Agency (SOCA), a national law enforcement age ncy of the United Kingdom. LulzSec claimed to have taken the website offline at about 11 am EST on 20 June 2011, though it only remained down for a few minutes. [85] While the attack appeared to be a DDoS attack, LulzSec tweeted that actual hacking was taking place "behind the scenes". At about 6:10 pm EST on 20 June, S OCA's website went down yet again.[86] SOCA's website was back online sometime b etween 20 and 21 June.[87] The website of the local district government of Jianh ua District in Qiqihar, China, was also knocked offline.[88] Early in the mornin g on 22 June, it was revealed that LulzSec's "Brazilian unit" had taken down two Brazilian government websites, brasil.gov.br and presidencia.gov.br.[89][90] Th ey also brought down the website of Brazilian energy company Petrobras.[91] On 20 June, two members on the "Lulz Boat" reportedly leaked logs that LulzSec w as going to leak on 21 June. They also claimed that the two had leaked informati on that aided authorities in locating and arresting Ryan Cleary, a man loosely a ffiliated with the group.[92] LulzSec posted various personal information about the two on Pastebin including IP addresses and physical addresses. Both had been involved with cyber-crimes in the past, and one had been involved with hacking the game Deus Ex.[93] After LulzSec encouragement, some began tagging public locations with physical g raffiti reading "Antisec" as part of the operation. Numerous beachfronts in Miss ion Beach, San Diego were vandalized with the phrase.[94] Some local news organi zations mistook the graffiti in Mission Beach as signs of the Antisec Movement. Many commenters on the local news websites corrected this.[95] On 23 June, LulzSec released a number of documents pertaining to the Arizona Dep artment of Public Safety, which they titled "chinga la migra", which roughly tra nslates to "fuck the border patrol". The leaked items included email addresses a nd passwords, as well as hundreds of documents marked "sensitive" or "for offici al use only". LulzSec claimed that this was in protest of the law passed in Ariz ona requiring some aliens to carry registration documents at all times.[96][97] Arizona officials have confirmed the intrusion.[98] Arizona police have complain ed that the release of officer identities and the method used to combat gangs co uld endanger the lives of police officers.[99] On 24 June 2011, LulzSecBrazil published what they claimed were access codes and passwords that they used to access the Petrobras website and employee profile d ata they had taken using the information. Petrobras denied that any data had bee n stolen, and LulzSecBrazil removed the information from their Twitter feed a fe w hours later.[100] The group also released personal information regarding Presi dent of Brazil Dilma Rousseff and Mayor of Sao Paulo Gilberto Kassab.[101] On 25 June 2011, LulzSec released what they described as their last data dump. T he release contained an enormous amount of information from various sources. The files contained a half gigabyte of internal information from telecommunication
company AT&T, including information relating to its release of 4G LTE and detail s pertaining to over 90,000 personal phones used by IBM. The IP addresses of sev eral large corporations including Sony, Viacom, and Disney, EMI, and NBC Univers al were included.[102][103] It also contained over 750,000 username and password combinations from several websites,[103] including 200,000 email addresses, use rnames, and encrypted passwords from hackforums.net; 12,000 names, usernames, an d passwords of the NATO online bookshop; half a million usernames and encrypted passwords of players of the online game Battlefield Heroes; 50,000 usernames, em ail addresses, and encrypted passwords of various video game forum users; and 29 users of Priority Investigations, an Irish private investigation company. Also included were an internal manual for AOL engineering staff and a screencapture o f a vandalized page from navy.mil, the website of the United States Navy.[102] M embers of the group continued the operation with members of Anonymous after disb anding.[25] Despite claiming to have retired, on 18 July LulzSec hacked into the website of British newspaper The Sun.[26] The group redirected the newspaper's website to a n also-hacked redesign website of another newspaper The Times, altering the site to resemble The Sun and posting a fake story claiming that Rupert Murdoch had d ied after ingesting a fatal dose of palladium.[104] They objected to the involve ment of News Corporation, the Murdoch-owned company that publishes The Sun and T he Times, in a large phone hacking scandal. The hacked website also contained a webcomic depicting LulzSec deciding on and carrying out the attack.[26][105] The group later redirected The Sun website to their Twitter feed. News Internationa l released a statement regarding the attacks before having the page the statemen t appeared on also redirected to the LulzSec Twitter page and eventually taken o ffline. The group also released the names and phone numbers of a reporter for Th e Sun and two others associated with the newspaper and encouraged their supporte rs to call them. In recent times NovaCygni of AntiSec has openly touted that the news channel Russian Television (RT) has openly stated support for the Anonymou s movement and that at least one reporter for them is a active member of Anonymo us. They further included an old email address and password of former News Inter national executive Rebekah Brooks.[106] News Corporation took the websites offli ne as a precaution later in the day.[107] Denied attacks The media reported a number of attacks, originally attributed to LulzSec, that t he group later denied involvement in. On 21 June, someone claiming to be from th e group posted on Pastebin that they had stolen the entire database of the Unite d Kingdom Census 2011. LulzSec responded by saying that they had obtained no suc h data and that whoever posted the notice was not from the group. British offici als said they were investigating the incident, but have found no evidence that a ny databases had been compromised or any information taken.[108] The British gov ernment, upon concluding their investigation, called the claims that any informa tion on the census was taken a hoax.[109] In June 2011, assets belonging to newspaper publisher News International were at tacked, apparently in retaliation for reporting by The Sun of the arrest of Ryan Cleary, an associate of the group. The newspaper's website and a computer used in the publishing process of The Times were attacked.[110] However, LulzSec deni ed any involvement, stating "we didn't attack The Sun or The Times in any way wi th any kind of DDoS attack".[111] Members of AntiSec based in Essex England clai med responsibility for the attack. Hacker actions against LulzSec A number of different hackers have targeted LulzSec and its members in response to their activities. On 23 June 2011, Fox News reported that rival hacker group TeaMp0isoN were responsible for outing web designer and alleged LulzSec member S ven Slootweg, who they said used the online nickname Joepie91,[112] and that the y have intentions to do the same with every member.[113] A Pastebin post in June
2011 from hacker KillerCube identified LulzSec leader Sabu as Hector Xavier Mon segur, an identification later shown to be accurate.[114] A group calling themselves Team Web Ninjas appeared in June 2011 saying they wer e angry over the LulzSec release of the e-mail addresses and passwords of thousa nds of normal Internet users. They attempted to publicly identify the online and real world identities of LulzSec leadership and claimed to do so on behalf of t he group's victims.[115] The group claimed to have identified and given to law e nforcement the names of a number of the group's members, including someone they claimed is a United States Marine.[116] The Jester, a hacker who generally went by the leetspeak handle th3j35t3r, vowed to find and expose members of LulzSec.[99] Claiming to perform hacks out of a s ense of American patriotism,[117] he attempted to obtain and publish the real wo rld personally identifiable information of key members, whom he described as "ch ildish".[115] On 24 June 2011, he claimed to have revealed the identity of LulzS ec leader Sabu as an information technology consultant possibly from New York Ci ty.[118] On 24 June 2011, a hacker allegedly going by the name Oneiroi briefly t ook down the LulzSec website in what he labelled "Operation Supernova".[119] The Twitter page for the group also briefly became unavailable.[120] On 24 June 2011, The Guardian published leaked logs from one of the group's IRC channels.[121] The logs were originally assumed to have been leaked by a disillu sioned former member of the group who went by the nickname m_nerva,[21] yet fell ow hacker Michael Major, known by his handle 'hann', later claimed responsibilit y.[122] After confirming that the leaked logs were indeed theirs, and that the l ogs revealed personal information on two members who had recently left the group due to the implications of attacking the FBI website, LulzSec went on to threat en m_nerva on their Twitter feed.[21] LulzSec claimed the logs were not from one of their core chatting channels, but rather a secondary channel used to screen potential backups and gather research.[21] A short time before LulzSec claimed to be disbanding, a group calling itself the A-Team posted what they claimed was a full list of LulzSec members online along with numerous chat logs of the group communicating with each other. A rival hac ker going by the name of TriCk also claimed to be working to reveal the group's identities and claimed that efforts on the part of rival hackers had pushed the group to disband for fear of being caught.[123] Law enforcement response On 21 June 2011, the Metropolitan Police announced that they had arrested a 19-y ear-old man from Wickford, Essex, named by LulzSec and locally as Ryan Cleary,[1 24] as part of an operation carried out in cooperation with the FBI.[125] The su spect was arrested on charges of computer misuse and fraud,[126] and later charg ed with five counts of computer hacking under the Criminal Law Act and the Compu ter Misuse Act.[127] News reports described him as an alleged member of LulzSec. [128] LulzSec denied the man arrested was a member.[129] A member of LulzSec cla imed that the suspect was not part of the group, but did host one of its IRC cha nnels on his server.[130] British police confirmed that he was being questioned regarding alleged involvement in LulzSec attacks against the Serious Organized C rime Agency (SOCA) and other targets. They also questioned him regarding an atta ck on the International Federation of the Phonographic Industry in November 2010 .[127] On 25 June 2011 the court released Cleary under the bail conditions that he not leave his house without his mother and not use any device connected to th e internet. He was diagnosed the previous week with Asperger syndrome.[131] In J une 2012 Cleary, together with another suspected LulzSec member, 19-year old Jak e Davis, pleaded guilty conspiring to attack government, law enforcement and med ia websites in 2011.[132] At around the same time as Cleary's arrest, Federal Bureau of Investigation agen
ts raided the Reston, Virginia facility of Swiss web hosting service DigitalOne. [133] The raid took several legitimate websites offline for hours as the agency looked for information on an undisclosed target.[134] Media reports speculated t he raid may have been related to the LulzSec investigation.[133] A few days before LulzSec disbanded, the FBI executed a search warrant on an Iow a home rented by Laurelai Bailey. Authorities interviewed her for five hours and confiscated her hard drives, camera, and other electronic equipment, but no cha rges were filed. Bailey denied being a member of the group, but admitted chattin g with members of LulzSec online and later leaking those chats.[135] The FBI was interested in having her infiltrate the group, but Bailey claimed the members h ated her and would never let her in.[136] The questioning by the FBI led a local technical support company to fire Laurelai, claiming she embarrassed the compan y.[137][138] On 27 June 2011, the FBI executed another search warrant in Hamilton, Ohio. The local media connected the raid to the LulzSec investigation; however, the warran t was sealed, the name of the target was not revealed, and the FBI office in Cin cinnati refused to comment on any possible connection between the group and the raid.[139] No one was charged with a crime after the FBI served the warrant.[140 ] Some reports suggested the house may have belonged to former LulzSec member m_ nerva, whom was originally suspected of leaking a number of the group's logs to the press, and information leading to the warrant supplied by Ryan Cleary.[141] On 19 July 2011, the London Metropolitan Police announced the arrest of LulzSec member Tflow. A 16-year-old male was arrested in South London on charges of viol ating the Computer Misuse Act, as part of an operation involving the arrest of s everal other hackers affiliated with Anonymous in the United States and United K ingdom.[37][142] LulzSec once again denied that any of their membership had been arrested, stating "there are seven of us, and we're all still here."[143] On the same day the FBI arrested 21-year-old Lance Moore in Las Cruces, New Mexi co, accusing him of stealing thousands of documents and applications from AT&T t hat LulzSec published as part of their so called "final release".[143] The Police Central E-Crime Unit arrested an 18-year-old man from Shetland on 27 July 2011 suspected of being LulzSec member Topiary. They also searched the hous e of a 17-year-old from Lincolnshire possibly connected to the investigation, in terviewing him.[34] Scotland Yard later identified the man arrested as Yell, She tland resident Jake Davis. He was charged with unauthorized access of a computer under the Computer Misuse Act 1990, encouraging or assisting criminal activity under the Serious Crime Act 2007, conspiracy to launch a denial-of-service attac k against the Serious Organised Crime Unit contrary to the Criminal Law Act 1977 , and criminal conspiracy also under the Criminal Law Act 1977.[144] Police conf iscated a Dell laptop and a 100-gigabyte hard drive that ran 16 different virtua l machines. Details relating to an attack on Sony and hundreds of thousands of e mail addresses and passwords were found on the computer.[145] A London court rel eased Davis on bail under the conditions that he live under curfew with his pare nts and have no access to the internet. His lawyer Gideon Cammerman stated that, while his client did help publicize LulzSec and Anonymous attacks, he lacked th e technical skills to have been anything but a sympathizer.[145] In early September 2011, Scotland Yard made two further arrests relating to Lulz Sec. Police arrested a 24-year-old male in Mexborough, South Yorkshire and a 20year-old male in Warminster, Wiltshire. The two were accused of conspiring to co mmit offenses under the Computer Misuse Act of 1990; police said that the arrest s related to investigations into LulzSec member Kayla.[146] On 22 September 2011, the FBI arrested Cody Kretsinger, a 23-year-old from Phoen ix, Arizona who was indicted on charges of conspiracy and the unauthorized impai
rment of a protected computer. He is suspected of using the name "recursion" and assisting LulzSec in their early hack against Sony Pictures Entertainment, thou gh he allegedly erased the hard drives he used to carry out the attack.[147] Kre tsinger was released on his own recognizance under the conditions that he not ac cess the internet except while at work and that he not travel to any states othe r than Arizona, California, or Illinois. The case against him was filed in Los A ngeles, where Sony Pictures is located.[148] Kretsinger pleaded guilty on 5 Apri l 2012 to one count of conspiracy and one count of unauthorized impairment of a protected computer.[149] On 19 April 2013, Kretsinger was sentenced to one year in prison for the "unauthorized impairment of protected computers".[150] On 6 March 2012, two men from Great Britain, one from the United States, and two from Ireland were charged in connection to their alleged involvement with LulzS ec. The FBI revealed that supposed LulzSec leader Hector Xavier Monsegur, who we nt by the username Sabu, had been aiding law enforcement since pleading guilty t o twelve counts, including conspiracy and computer hacking, on 15 August 2011 as part of a plea deal.[36] In exchange for his cooperation, federal prosecutors a greed not to prosecute Monsegur for his computer hacking, and also not to prosec ute him for two attempts to sell marijuana, possession of an illegal handgun, pu rchasing stolen property, charging $15,000 to his former employer's credit card in a case of identity theft, and directing people to buy prescription drugs from illegal sources. He still faces a misdemeanor charge of impersonating a federal agent.[151] Five suspects were charged with conspiracy: Jake Davis, accused of being the hacker "Topiary" (who had been previously arrested); Ryan Ackroyd of L ondon, accused of being "Kayla"; Darren Martyn of Ireland, accused of being "pwn sauce"; Donncha O Cearrbhail of Ireland, accused of being "palladium"; and Jeremy Hammond of Chicago, accused of being "Anarchaos". While not a member of LulzSec, authorities suspect Hammond of being a member of Anonymous and charged him with access device fraud and hacking in relation to his supposed involvement in the December 2011 attack on intelligence company Stratfor as part of Operation AntiS ec.[36] On 8 April 2013, Jake 'Topiary' Davis and three other LulzSec members pled guilt y to charges of computer hacking at Southwark Crown Court in London.[152] On 24 April 2013, Australian Federal Police arrested 24-year-old Matthew Flanner y of Sydney, who claimed to be "in charge" of LulzSec. Flannery, who went by the username Aush0k, was arrested for the alleged hacking of an unnamed Australian government agency.[153][154] See also Portal icon Computer security portal Portal icon Internet portal Hacktivism Operation Anti-Security Operation Payback PlayStation Network outage Anonymous (group) LulzRaft Securax Malsec References ^ Jump up to: a b Weisenthal, Joe (25 June 2011). "Notorious Hacker Group Lu lzSec Just Announced That It's Finished". Business Insider. Silicon Alley Inside r. Archived from the original on 25 June 2011. Retrieved 25 June 2011. Jump up ^ "LulzSec hackers claim CIA website shutdown". BBC. 16 June 2011. R etrieved 17 June 2011. Jump up ^ "Is There a Hacking Epidemic?".
Jump up ^ Svensson, Peter (2011-06-27). "Parting is such tweet sorrow for ha cker group". The Sydney Morning Herald (The Sydney Morning Herald). Retrieved 20 11-06-29. ^ Jump up to: a b c United States District Court for the Southern District o f New York (13 March 2012). "United States v. Ackroyd et al". New York City: Wir ed. pp. 1 13. Archived from the original on 14 March 2012. Retrieved 14 March 2012 . ^ Jump up to: a b "Who is LulzSec, Hacker of PBS? Are they hacking Sony agai n?". International Business Times. Retrieved 3 June 2011. Jump up ^ Poulsen, Kevin (2 June 2011). "Sony Hit Yet Again; Consumer Passwo rds Exposed". Wired. Retrieved 3 June 2011. ^ Jump up to: a b "A Brief History of the LulzSec Hackers". New York City: F ox News Channel. 21 June 2011. Archived from the original on 21 June 2011. Retri eved 21 June 2011. ^ Jump up to: a b c d e Morse, Andrew; Sherr, Ian (6 June 2011). "For Some H ackers, The Goal Is Just To Play A Prank". The Wall Street Journal. p. B1. Retri eved 6 June 2011. Jump up ^ "LulzSec threatens governments". RT. 21 June 2011. Retrieved 22 Ju ne 2011. ^ Jump up to: a b c "Q&A: Lulz Security". BBC. 6 June 2011. Retrieved 6 June 2011. Jump up ^ Mitchell, Dan (9 June 2011). "Yet another hack, yet another delay in reporting it". CNN Money. Retrieved 11 June 2011. Jump up ^ Raywood, Dan (10 June 2011). "Security expert publicly backs 'grey hats' such as LulzSec, saying that public disclosure will help businesses". SC Magazine. Retrieved 11 June 2011. Jump up ^ Acohido, Byron (20 June 2011). "Who's who among key LulzSec hackit ivists". USA Today. Retrieved 21 June 2011. Jump up ^ Olson, Parmy (6 June 2011). "LulzSec Hackers Post Sony Dev. Source Code, Get $7K Donation". Forbes. Retrieved 7 June 2011. Jump up ^ Paul, Ian. "Lulz Boat Hacks Sony's Harbor: FAQ." PC World. 3 June 2011. Retrieved on 6 June 2011. LulzSec continues the Jump up ^ Ragan, Steve (8 June 2011). "One month later ir personal brand of comedy". The Tech Herald. Retrieved 9 June 2011. Jump up ^ Beltrame, Julian (8 June 2011). "Hacker without a cause scores wit h Harper 'breakfast incident' hoax". The Canadian Press. Retrieved 10 June 2011. Jump up ^ Boscker, Bianca (15 June 2011). "LulzSec Hacker Group Now Taking R equests". The Huffington Post (New York City). AOL. Archived from the original o n 15 June 2011. Retrieved 15 June 2011. Jump up ^ Albanesius, Chloe (15 June 2011). "LulzSec Call-In Line Taking Hac king Requests". PC Magazine. Archived from the original on 15 June 2011. Retriev ed 15 June 2011. ^ Jump up to: a b c d Gallagher, Ryan (24 June 2011). "Inside LulzSec: Chatr oom logs shine a light on the secretive hackers". The Guardian (London). Archive d from the original on 25 June 2011. Retrieved 25 June 2011. ^ Jump up to: a b Weisenthal, Joe (25 June 2011). "Notorious Hacker Group Lu lzSec Just Announced That It's Finished". Business Insider. Archived from the or iginal on 25 June 2011. Retrieved 25 June 2011. Jump up ^ Moyer, Edward (25 June 2011). "Hacking group LulzSec says it's cal ling it quits". CNET.com. CBS Interactive. Archived from the original on 26 June 2011. Retrieved 26 June 2011. Jump up ^ Svensson, Peter (26 June 2011). "Hacker group LulzSec says it's di sbanding". USA Today. Associated Press. Retrieved 27 June 2011. ^ Jump up to: a b Olivarez-Giles, Nathan (29 June 2011). "AntiSec 'hackers w ithout borders' claim new hack on Arizona state police". Los Angeles Times (Los Angeles). Archived from the original on 30 June 2011. Retrieved 30 June 2011. ^ Jump up to: a b c Gayomail, Chris (18 July 2011). "LulzSec Hacks 'News of the World' and 'The Sun,' Plants Fake Murdoch Death Story". Time. Archived from the original on 18 July 2011. Retrieved 18 July 2011. ^ Jump up to: a b c d e f g Poeter, Damon (2 July 2011). "Who Is LulzSec?".
PC Magazine. Ziff Davis. pp. 1 9. Archived from the original on 5 July 2011. Retri eved 5 July 2011. ^ Jump up to: a b "Infamous international hacking group LulzSec brought down by own leader". Fox News. Jump up ^ "Criminal Indictment Against Sabu (original document)". Jump up ^ "Chats, Car Crushes and Cut 'N Paste Sowed Seeds Of LulzSec's Demi se" Jump up ^ Goodman, William (24 February 2011). "Video: Anonymous hacks Westb oro Baptist Church website during on-air confrontation". CBS News (New York City ). CBS. Archived from the original on 5 July 2011. Retrieved 5 July 2011. ^ Jump up to: a b c d Olson, Parmy (2012). We Are Anonymous: Inside the Hack er World of LulzSec, Anonymous and the Global Cyber Insurgency. Little, Brown. I SBN 978-0-316-21354-7. Jump up ^ "Twitter". Twitter. 2011-01-02. Retrieved 2011-12-20. ^ Jump up to: a b "Man arrested over computer hacking claims". BBC News (Lon don). BBC. 27 July 2011. Archived from the original on 27 July 2011. Retrieved 2 7 July 2011. Jump up ^ "LulzSec: Shetland teen charged over computer hacking claims". BBC News (London). BBC. 31 July 2011. Archived from the original on 31 July 2011. R etrieved 31 July 2011. ^ Jump up to: a b c Winter, Jana (6 March 2012). "Infamous international hac king group LulzSec brought down by own leader". Fox News Channel (New York City) . Archived from the original on 13 March 2012. Retrieved 13 March 2012. ^ Jump up to: a b Kaplan, Jeremy (19 July 2011). "Leading Member of LulzSec Hacker Squad Arrested in London". Fox News Channel (New York City). Archived fro m the original on 20 July 2011. Retrieved 20 July 2011. Jump up ^ "Accused Irish LulzSec hacker worked in security". MSNBC (New York City). NBCUniversal. 9 March 2012. Archived from the original on 14 March 2012. Retrieved 14 March 2012. Jump up ^ An Interview with Anonymous. High Severity (2011-01-08). Retrieved on 2013-09-05. Jump up ^ "LulzSec chatlogs analysed: who talked to who, and when". The Guar dian. Jump up ^ "LulzSec 'hacktivists' handed long jail sentences for hacking". Th e Guardian. Jump up ^ LulzSec (24 June 2011). "Chinga La Migra (download torrent)". The Pirate Bay. Retrieved 25 June 2011. Jump up ^ "Chinga La Migra bulletin No.1" (.txt). lulzsecurity.com. 23 June 2011. Retrieved 25 June 2011. Jump up ^ Adam Clark Estes. "LulzSec Document Release Targets Arizona Border Patrol". The Atlantic Wire. Jump up ^ Downie, James (14 June 2011). "Hacking For Fun More Than Profit". The New Republic (Washington, D.C.). Mike Rancilio. Archived from the original o n 20 June 2011. Retrieved 20 June 2011. ^ Jump up to: a b Taylor, Jerome (16 June 2011). "Who are the group behind t his week's CIA hack?". The Independent (London). Independent Print Limited. Arch ived from the original on 20 June 2011. Retrieved 20 June 2011. ^ Jump up to: a b Murphy, David (19 June 2011). "Three Reasons to Fear Lulzs ec: Sites, Skills, and Slant". PC Magazine. Archived from the original on 20 Jun e 2011. Retrieved 20 June 2011. Jump up ^ Poulsen, Kevin (30 May 2011). "Hacktivists Scorch PBS in Retaliati on for WikiLeaks Documentary". Wired (magazine). Archived from the original on 2 0 June 2011. Retrieved 20 June 2011. ^ Jump up to: a b Ross, Nick (20 June 2011). "Lulzsec teams up with Anonymou s". ABC Online. Australian Broadcasting Corporation. Retrieved 20 June 2011. Jump up ^ Chapman, Stephen (22 June 2011). "LulzSec: Doing it more for the m oney than the lulz?". ZDNet. CBS Interactive. Archived from the original on 22 J une 2011. Retrieved 22 June 2011. Jump up ^ Ragan, Steve (6 June 2011). "Unveillance faces troubled waters in the wake of LulzSec visit". The Tech Herald. Archived from the original on 22 Ju
ne 2011. Retrieved 22 June 2011. Jump up ^ "Lulz? Sony hackers deny responsibility for misuse of leaked data" . Ars Technica. Conde Nast Publications. 4 June 2011. Archived from the original on 20 June 2011. Retrieved 20 June 2011. ^ Jump up to: a b Anderson, Nate (18 June 2011). "LulzSec manifesto: "We scr ew each other over for a jolt of satisfaction"". Ars Technica. Conde Nast Public ations. Archived from the original on 20 June 2011. Retrieved 20 June 2011. Jump up ^ Poulsen, Kevin (24 June 2011). "LulzSec Releases Arizona Police Do cuments". Wired. Archived from the original on 24 June 2011. Retrieved 24 June 2 011. Jump up ^ Stevenson, Alastair (22 June 2011). "Operation Anti-Security: Anon ymous yet to act while LulzSec rampage". International Business Times (New York City). Archived from the original on 24 June 2011. Retrieved 24 June 2011. Jump up ^ Watts, Susan (24 June 2011). "Newsnight online 'chat' with Lulz Se curity hacking group". BBC News (London). BBC. Archived from the original on 30 June 2011. Retrieved 30 June 2011. Jump up ^ CNN Wire Staff. "Hackers pirate PBS website, post fake story about Tupac still alive". CNN. Retrieved 3 June 2011. Jump up ^ Olson, Parmy (31 May 2011). "Interview With PBS Hackers: We Did It For Lulz And Justice ". Forbes. Retrieved 3 June 2011. Jump up ^ Kaplan, Jeremy (2 June 2011). "Group Claims It Was 'Paid to Hack P BS,' Then Leaks a Million Sony User IDs". Fox News. Retrieved 3 June 2011. Jump up ^ Pepitone, Julianne (2 June 2011). "Group claims fresh hack of 1 mi llion Sony accounts Money". CNN. Retrieved 3 June 2012. Jump up ^ Ogg, Erica. "Hackers steal more customer info from Sony servers". CNET. Retrieved 3 June 2012. Jump up ^ Reisinger, Don. "Tupac hackers to Sony: 'Beginning of the end'". C NET. Retrieved 3 June 2012. Jump up ^ Ars Staff. "Lulz? Sony hackers deny responsibility for misuse of l eaked data". Ars Technica. Retrieved 3 June 2012. Jump up ^ Olivarez-Giles, Nathan (9 June 2012). "Sony Pictures says LulzSec hacked 37,500 user accounts, not 1 million". Los Angeles Times (Los Angeles). Ar chived from the original on 12 June 2012. Retrieved 12 June 2012. Jump up ^ Murphy, David (5 June 2012). "LulzSec Hacks Nintendo: No User Info rmation Released". PCMag. Retrieved 5 June 2011. Jump up ^ Tabuchi, Hiroko (5 June 2012). "Nintendo Is Hit by Hackers, but Br each Is Deemed Minor". New York Times. Retrieved 5 June 2011. Jump up ^ Thomas, Keir (11 June 2012). "Porn Site Users Beware: Hacker Group LulzSec May Have Posted Your Email Address". PC World. Archived from the origin al on 11 June 2012. Retrieved 11 June 2012. Jump up ^ Albanesius, Chloe (13 June 2012). "LulzSec Targets Bethesda Softwo rks, Porn Site". PC magazine. Retrieved 13 June 2012. Jump up ^ Ben, Kuchera. "LulzSec hackers demand hats, threaten release of Br ink user data". Ars Technica. Retrieved 13 June 2012. Jump up ^ Bright, Peter (14 June 2011). "Titanic Takeover Tuesday: LulzSec's busy day of hacking escapades". Ars Technica. Archived from the original on 14 June 2011. Retrieved 14 June 2011. Jump up ^ Peckham, Matt (14 June 2011). "LulzSec Knocks 'Minecraft,' 'EVE On line,' 'League Of Legends' and 'The Escapist' Offline". Time (New York City). Ar chived from the original on 14 June 2011. Retrieved 14 June 2011. Jump up ^ LulzSec. "Tweet 81036958826102784". Twitter. Retrieved 15 June 201 1. Jump up ^ LulzSec. "Tweet 81327464156119040". Twitter. Retrieved 16 June 201 2. Jump up ^ Kobie, Nicole (16 June 2011). "LulzSec hackers leak 62,000 email l ogins". PC Pro. Archived from the original on 16 June 2011. Retrieved 16 June 20 12. Jump up ^ Dunn, John (19 June 2011). "LulzSec Hacker Victims Alerted". PC Wo rld (magazine). IDG. Archived from the original on 19 June 2011. Retrieved 19 Ju ne 2011.
Jump up ^ "LulzSec claims to have hacked FBI-affiliated website". LA Times. Retrieved 4 June 2012. Jump up ^ Read, Max. "LulzSec Hackers Go After FBI Affiliates". Gawker. Retr ieved 4 June 2012. Jump up ^ "Hackers warn NHS over security". BBC. 9 June 2012. Retrieved 9 Ju ne 2012. Jump up ^ Ogg, Erica (13 June 2012). "LulzSec targets videogame maker ZeniMa x Media". CNET.com. CBS Interactive. Archived from the original on 13 June 2012. Retrieved 13 June 2011. Jump up ^ Morse, Andrew (13 June 2012). "LulzSec Hacker Group Claims Attack On US Senate Website". The Wall Street Journal. Archived from the original on 13 June 2012. Retrieved 13 June 2011. Jump up ^ "CIA website hacked; LulzSec takes credit (again)". Consumer Repor ts. 16 June 2012. Archived from the original on 16 June 2012. Retrieved 16 June 2011. Jump up ^ Nakashima, Ellen (15 June 2012). "CIA Web site hacked; group LulzS ec takes credit". The Washington Post. Archived from the original on 16 June 201 2. Retrieved 16 June 2011. Jump up ^ "Hackers voltam a atacar sites portugueses". TVI 24 (in Portuguese ). Televisao Independente. 2 December 2012. Archived from the original on 3 Dece mber 2011. Retrieved 3 December 2012. Jump up ^ Acohido, Byron (20 June 2011). "LulzSec, Anonymous declare war aga inst governments, corporations". USA Today. Archived from the original on 20 Jun e 2011. Retrieved 20 June 2011. Jump up ^ Meyer, David (20 June 2011). "LulzSec claims Soca hack". ZDNet. CB S Interactive. Archived from the original on 20 June 2011. Retrieved 20 June 201 1. Jump up ^ "Soca website taken down after LulzSec 'Ddos attack'". BBC. 20 Jun e 2011. Retrieved 20 June 2011. Jump up ^ Henderson, Nicole (21 June 2011). "SOCA Website Back Online After LulzSec DDoS Attack". Web Host Industry Review. Retrieved 21 June 2011. Jump up ^ Ragan, Steve (21 June 2011). "LulzSec and Anonymous: Hunting for s keletons hidden in closets". The Tech Herald. Archived from the original on 21 J une 2011. Retrieved 21 June 2011. Jump up ^ Emery, Daniel (22 June 2011). "LulzSec hits Brazilian websites". B BC. Retrieved 22 June 2011. Jump up ^ Clark, Jack (22 June 2011). "LulzSec takes down Brazil government sites". CNet. Retrieved 22 June 2011. Jump up ^ McMillan, Robert (22 June 2011). "Brazilian Government, Energy Com pany Latest LulzSec Victims". PC World. Archived from the original on 22 June 20 11. Retrieved 22 June 2011. Jump up ^ Rodriguez, Salvador (21 June 2011). "LulzSec says it's outing two who may have led to arrest of an alleged hacker". Los Angeles Times (Los Angeles ). Archived from the original on 22 June 2011. Retrieved 22 June 2011. Jump up ^ Aamoth, Doug (21 June 2011). "Trouble in Paradise? LulzSec Outs Tw o Apparent 'Snitches'". TechLand (Time Magazine). Retrieved 21 June 2011. Jump up ^ Gayathri, Amrutha (21 June 2011). "Operation Anti-Security: Myster ious serial graffiti reported; LulzSec gaining mass support?". International Bus iness Times (New York City). Archived from the original on 21 June 2011. Retriev ed 21 June 2011. Jump up ^ ""Anti-Sec" group spreads message through graffiti in Mission Beac h". CBS 8. 20 June 2011. Retrieved 21 June 2011. Jump up ^ Tsotsis, Alexia (23 June 2011). "LulzSec Releases Arizona Law Enfo rcement Data In Retaliation For Immigration Law". TechCrunch. Retrieved 23 June 2011. Jump up ^ Aamoth, Doug (23 June 2011). "LulzSec Claims Breach Against Arizon a Law Enforcement". Techland (Time). Retrieved 23 June 2011. Jump up ^ Lohr, Steve (23 June 2011). "Arrest Puts Spotlight on Brazen Hacki ng Group LulzSec". The New York Times. Archived from the original on 24 June 201 1. Retrieved 24 June 2011.
^ Jump up to: a b Poeter, Damon (24 June 2011). "Will LulzSec's Hit on Arizo na Cops be its Last Hurrah?". PC Magazine. Archived from the original on 25 June 2011. Retrieved 25 June 2011. Jump up ^ Rapoza, Kenneth (25 June 2011). "LulzSec Strikes Brazil Again; Pet robras Denies Being Hacked". Forbes Magazine (New York City). Archived from the original on 26 June 2011. Retrieved 26 June 2011. Jump up ^ Lopez, Luciana; Brian Ellsworth (24 June 2011). Anthony Boadle, ed . "Hackers target Brazilian statistics agency". London. Reuters. Archived from t he original on 26 June 2011. Retrieved 26 June 2011. ^ Jump up to: a b Greenberg, Andy (25 June 2011). "LulzSec Says Goodbye, Dum ping NATO, AT&T, Gamer Data". Forbes Magazine (New York City). Archived from the original on 26 June 2011. Retrieved 26 June 2011. ^ Jump up to: a b Whittaker, Zack (25 June 2011). "LulzSec disbands: Final c ache includes AT&T internal data and 750,000 user accounts". ZDNet. CBS Interact ive. Archived from the original on 26 June 2011. Retrieved 26 June 2011. Jump up ^ Rovzar, Chris (18 July 2011). "Website of Murdoch's Sun Hacked". N ew York Magazine. Archived from the original on 18 July 2011. Retrieved 18 July 2011. Jump up ^ Anonymous (18 July 2011). "Media moguls body discovered". The Time s. London. Archived from the original on 18 July 2011. Retrieved 18 July 2011. Jump up ^ Mills, Elinor (18 July 2011). "Hackers target Murdoch newspaper We b site". CNET. CBS Interactive. Archived from the original on 19 July 2011. Retr ieved 19 July 2011. Jump up ^ "Lulz Security hackers target Sun website". BBC News (London: BBC) . 18 July 2011. Archived from the original on 19 July 2011. Retrieved 19 July 20 11. Jump up ^ Paul, Ian (21 June 2011). "LulzSec Denies Taking U.K. Census Data" . PC World. IDG. Archived from the original on 21 June 2011. Retrieved 21 June 2 011. Jump up ^ Halliday, Josh (22 June 2011). "LulzSec census hacking claims 'a h oax'". The Guardian (London). Archived from the original on 22 June 2011. Retrie ved 22 June 2011. Jump up ^ Rayner, Gordon (23 June 2011). "Hackers hit News International in revenge for coverage of teenager's arrest". The Daily Telegraph (London). Archiv ed from the original on 24 June 2011. Retrieved 24 June 2011. Jump up ^ Stevenson, Alastair (24 June 2011). "LulzSec deny revenge hacks on the Sun and Times newspaper websites". International Business Times (New York C ity). Archived from the original on 24 June 2011. Retrieved 24 June 2011. Jump up ^ "LulzSec sails into sunset as TeaMp0isoN terrorizes Internet". 25 June 2011. Retrieved 4 July 2011. Jump up ^ Winter, Jana (23 June 2011). "Exclusive: Rival Hacker Group Racing Police to Expose LulzSec". Fox News. Retrieved 23 June 2011. Jump up ^ Mills, Elinor (6 March 2012). "Will LulzSec arrests stop high-prof ile hacks? Don't bet on it". CNET. CBS Interactive. Archived from the original o n 13 March 2012. Retrieved 13 March 2012. ^ Jump up to: a b Halliday, Josh (24 June 2011). "LulzSec: the members and t he enemies". The Guardian (London). Guardian Media Group. Archived from the orig inal on 25 June 2011. Retrieved 25 June 2011. Jump up ^ Mack, Eric (24 June 2011). "Hacker Civil War Heat Up". PC World (m agazine). Archived from the original on 25 June 2011. Retrieved 25 June 2011. Jump up ^ Vance, Ashlee (3 December 2010). "WikiLeaks Struggles to Stay Onli ne After Attacks". The New York Times. Retrieved 29 December 2010. Jump up ^ Chapman, Stephen (24 June 2011). "LulzSec's leader, Sabu, revealed ?". ZDNet. CBS Interactive. Archived from the original on 25 June 2011. Retrieve d 25 June 2011. Jump up ^ Halliday, Josh (24 June 2011). "LulzSec site taken down by lone-wo lf hacker". The Guardian (London). Archived from the original on 24 June 2011. R etrieved 24 June 2011. Jump up ^ Pakinkis, Tom (24 June 2011). "LulzSec hacked by anti-hacking grou p?". ComputerAndVideoGames.com. Archived from the original on 25 June 2011. Retr
ieved 25 June 2011. Jump up ^ Arthur, Charles; Ryan Gallagher (24 June 2011). "News Technology L ulzSec LulzSec IRC leak: the full record". The Guardian (London). Guardian Media Group. Archived from the original on 25 June 2011. Retrieved 25 June 2011. Jump up ^ "The Hackers Who Tried To Sink The Lulz Boat". The Smoking Gun. 1 July 2011. Retrieved 2013-04-08. Jump up ^ Taylor, Jerome (26 June 2011). "Hactivist collective LulzSec disba nds". The Independent (London). Archived from the original on 26 June 2011. Retr ieved 26 June 2011. Jump up ^ "Teenager arrested on suspicion of hacking". BBC. 21 June 2011. Re trieved 21 June 2011. Jump up ^ "e-Crime unit arrest man". Metropolitan Police Service. Retrieved 21 June 2011. Jump up ^ Schwartz, Matthew (21 June 2011). "Scotland Yard Busts Alleged Lul zSec Mastermind". InformationWeek (San Francisco). UBM plc. Archived from the or iginal on 21 June 2011. Retrieved 21 June 2011. ^ Jump up to: a b Dodd, Vikram (22 June 2011). "Teenager Ryan Cleary charged over LulzSec hacking". The Guardian (London). Archived from the original on 22 June 2011. Retrieved 22 June 2011. Jump up ^ Williams, Christopher (21 June 2011). "Hackers 'steal entire 2011 census'". The Daily Telegraph (London). Retrieved 21 June 2011. Jump up ^ Martinez, Edecio (21 June 2011). "LulzSec responds to UK hacker ar rest, says "we're all still here!"". CBS News (New York City). CBS Corporation. Archived from the original on 21 June 2011. Retrieved 21 June 2011. Jump up ^ Hardawar, Devindra (21 June 2011). "LulzSec denies involvement in UK Census hack, suspected member arrested". VentureBeat. Archived from the origi nal on 21 June 2011. Retrieved 21 June 2011. Jump up ^ Halliday, Josh (27 June 2011). "Teen accused of attacking SOCA web site released on conditional bail". The Guardian (London). Archived from the ori ginal on 27 June 2011. Retrieved 27 June 2011. Jump up ^ "Two LulzSec Hackers Plead Guilty in Britain". The New York Times. The Associated Press. 25 June 2012. ^ Jump up to: a b Williams, Christopher (22 June 2011). "FBI seized web serv ers as LulzSec suspect was arrested". The Daily Telegraph (London). Archived fro m the original on 22 June 2011. Retrieved 22 June 2011. Jump up ^ Kopytoff, Verne (21 June 2011). "F.B.I. Seizes Web Servers, Knocki ng Sites Offline". The New York Times. Archived from the original on 22 June 201 1. Retrieved 22 June 2011. Jump up ^ Paul, Ian (29 June 2011). "FBI Steps Up Hunt for LulzSec". PC Worl d. Archived from the original on 29 June 2011. Retrieved 29 June 2011. Jump up ^ Choney, Suzanne (28 June 2011). "A female hacker in the mix?". MSN BC. NBCUniversal. Archived from the original on 30 June 2011. Retrieved 30 June 2011. Jump up ^ "Finally! Hackers switch tactics and bring down Al Qaeda's communi cations, as FBI closes in on group after 50-day spree: FBI raids home of woman i n Iowa as it continues investigation into hacking group LulzSec". Daily Mail (Lo ndon). Associated Newspapers. 30 June 2011. Archived from the original on 30 Jun e 2011. Retrieved 30 June 2011. Jump up ^ Chen, Adrian (28 June 2011). "FBI Raids Iowa Woman's Home in Lulz Security Hacker Investigation". Gawker. Gawker Media. Archived from the original on 15 July 2011. Retrieved 15 July 2011. Jump up ^ McMillan, Robert (29 June 2011). "With FBI raid, law enforcement c ircles LulzSec". Computerworld. International Data Group. Archived from the orig inal on 30 June 2011. Retrieved 30 June 2011. Jump up ^ Pack, Lauren (28 June 2011). "FBI hacking probe leads to area teen ". The Middletown Journal (Middletown, Ohio). Archived from the original on 30 J une 2011. Retrieved 30 June 2011. Jump up ^ Arthur, Charles (29 June 2011). "LulzSec hacking suspect's house s earched in Hamilton, Ohio". The Guardian (London). Archived from the original on 30 June 2011. Retrieved 30 June 2011.
Jump up ^ Greenberg, Andy (19 July 2011). "Hacker Arrests May Have Included Core Member Of LulzSec". Forbes (New York City). Archived from the original on 2 0 July 2011. Retrieved 20 July 2011. ^ Jump up to: a b Sterling, Toby (21 July 2011). "Dutch give details on 4 'A nonymous' hacker arrests". The Sydney Morning Herald (Sydney). Archived from the original on 21 July 2011. Retrieved 21 July 2011. Jump up ^ Albanesius, Chloe (31 July 2011). "Report: Scotland Yard Identifie s LulzSec Hacker". PC Magazine. Archived from the original on 31 July 2011. Retr ieved 31 July 2011. ^ Jump up to: a b Prodhan, Georgina (1 August 2011). "UK teen cyber activist bailed without Internet access". London. Thomson Reuters. Archived from the ori ginal on 1 August 2011. Retrieved 1 August 2011. Jump up ^ "LulzSec and Anonymous police and FBI investigation sees two more arrested". The Guardian (London). 2 September 2011. Retrieved 2 September 2011. Jump up ^ "FBI Arrests Suspected LulzSec and Anonymous Hackers". Fox News (N ew York City). 22 September 2011. Archived from the original on 23 September 201 1. Retrieved 22 September 2011. Jump up ^ Gorman, Steve (23 September 2011). "Suspected LulzSec hacker arres ted in Sony studio breach". Forbes (New York City). Archived from the original o n 23 September 2011. Retrieved 23 September 2011. Jump up ^ Slosson, Mary (5 April 2012). "Accused LulzSec hacker pleads guilt y in Sony breach". MSNBC. NBCUniversal. Archived from the original on 12 April 2 012. Retrieved 12 April 2012. Jump up ^ Whitcomb, Dan (19 April 2013). "Hacker gets a year in prison for S ony attack Read more: http://www.smh.com.au/it-pro/security-it/hacker-gets-a-yea r-in-prison-for-sony-attack-20130419-2i4hl.html#ixzz2RHvszNbi". Sydney Morning H erald. Retrieved 23 April 2013. Jump up ^ Caruso, David B.; Jennifer Peltz (9 March 2012). "Feds: NYC hacker also involved with drug dealing". The Boston Globe (Boston). Archived from the original on 13 March 2012. Retrieved 13 March 2012. Jump up ^ Halliday, Josh (9 April 2013). "LulzSec hacktivists plead guilty t o cyber-attacks on NHS, Sony and NI". The Guardian. Retrieved 9 April 2013. Jump up ^ "Self-proclaimed LulzSec leader arrested in NSW". ABC News. 24 Apr il 2013. Retrieved 24 April 2013. Jump up ^ "Self-proclaimed LulzSec Leader Arrested In Australia". 2013-04-23 . Retrieved 2013-04-24. External links LulzSec (Archive) Lulz Security on Twitter Lulzsecurity.org Current website referencing the latest attacks the group Lu LzSecReborn LulzSec at Formspring [hide] v t e Hacking in the 2010s Incidents 2010 Australian cyberattacks Operation Payback Operation Tunisia PlayStation Network outage Operation AntiSec 2012-13 Stratfor email leak
2012 LinkedIn hack 2013 South Korea cyberattack Groups Anonymous associated events GNAA Goatse Security LulzRaft LulzSec Syrian Electronic Army TeaMp0isoN UGNazi NullCrew RedHack Individuals Donncha O'Cearbhaill Jeremy Hammond George Hotz Guccifer Sabu Topiary The Jester weev Malware CryptoLocker Dexter Duqu FinFisher Flame Mahdi Metulji botnet Shamoon Stars virus Stuxnet Categories: Hacking in the 2010s 2011 establishments in the United States Hacker groups Navigation menu Create account Log in Article Talk Read Edit View history Main page
Contents Featured content Current events Random article Donate to Wikipedia Interaction Help About Wikipedia Community portal Recent changes Contact page Tools Print/export Languages ??????? ????? Deutsch Espanol Francais ??? Italiano Nederlands Portugues ??????? Suomi Ti?ng Vi?t ?? Edit links This page was last modified on 15 December 2013 at 06:28. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use a nd Privacy Policy. Wikipedia is a registered tr