An unidentified admin for Tennessee-based E Singles Inc. denied that its website, MilitarySingles.com, was breached, despite claims to the contrary.
"LulzSec Reborn" surfaced this week with a new collection of hacks. F-Secure's Chief Research Office Mikko Hypponen strongly doubts this is the same group, as does the company's Security Advisor, Sean Sullivan.
Hackers have broken into the database for a military dating website and stolen passwords, e-mail addresses, and other information from nearly 171,000 accounts, according to a posting on Pastebin this weekend.
The leaked data includes in email addresses from us.army.mil, navy.mil and microsoft.com domains, but what is interesting to note is that the group is using the name "LulzSec" and "LulzSec Reborn". Representatives from ESingles, the operator of the site, did not respond to emails seeking comment.
So apparently LulzSec are making a return - on April fools' day. Yeah, exactly. A Youtube video has been released claiming the return of LulzSec in what they're calling Operation LulzDay and a supposed Project Mayhem scheduled for December 21st.
When the FBI arrested LulzSec leader Hector "Sabu" Monsegur, they did so in a hurry—hours before the arrest, Sabu was doxed, his identity posted to the Internet. With his name public, federal agents feared that he would start destroying evidence to protect himself, so they ended their covert surveillance and moved in, according to Fox News.
Efforts to name and shame the LulzSec crew during its 50-day rampage were common. Many of these doxings were inaccurate, a result of faulty inferences or deliberate attempts to mislead on the part of the LulzSec hackers.