Skip to main content

LulzSec

Removing the anonymity from Anonymous

posted onMay 7, 2012
by l33tdawg

Anonymous, LulzSec and other hacktivists aren't as anonymous as they might think. They're being watched. On this week's Patch Monday podcast, a watcher tells us what he sees. 

Israeli information security researcher Tal Be'ery is the web security research team leader at Imperva's Application Defense Center (ADC), where he leads efforts to capture and analyse hacking data.

LulzSec member Cody Kertsinger pleads guilty to hacking Sony

posted onApril 6, 2012
by l33tdawg

Accused LulzSec hacker Cody Kretsinger pleaded guilty today in a federal court in Los Angeles, California, to felony charges associated with the breach of Sony Pictures Entertainment that occurred in mid-2011. Kretsinger went by the moniker "Recursion" and testified that he took part in a SQL injection attack on the Sony Pictures site, and stole personal information from thousands of people registered with the site. He also testified that he gave that personal information to other members of LulzSec to post publically.

LulzSec's Ryan Cleary back in jail

posted onApril 2, 2012
by l33tdawg

LulzSec's Ryan Cleary, the 19-year-old arrested last June for aiding in the operations of notorious hacking collective LulzSec, has landed back in jail.

Cleary, who was never an official LulzSec member but ran an Internet Relay Chat that the group used to communicate, had apparently been trading e-mails with Hector Xavier Monsegur, a.k.a. Sabu, the recently outed LulzSec mastermind turned FBI informant. That was a direct violation of his bail agreement, which dictated that Cleary was to have no access to the Internet whatsoever.  

"LulzSec Reborn" steals 171,000 passwords from military dating site

posted onMarch 27, 2012
by l33tdawg

Hackers have broken into the database for a military dating website and stolen passwords, e-mail addresses, and other information from nearly 171,000 accounts, according to a posting on Pastebin this weekend.

The leaked data includes in email addresses from us.army.mil, navy.mil and microsoft.com domains, but what is interesting to note is that the group is using the name "LulzSec" and "LulzSec Reborn". Representatives from ESingles, the operator of the site, did not respond to emails seeking comment. 

How Sabu was outed by former Anons long before his arrest

posted onMarch 22, 2012
by l33tdawg

When the FBI arrested LulzSec leader Hector "Sabu" Monsegur, they did so in a hurry—hours before the arrest, Sabu was doxed, his identity posted to the Internet. With his name public, federal agents feared that he would start destroying evidence to protect himself, so they ended their covert surveillance and moved in, according to Fox News.

Efforts to name and shame the LulzSec crew during its 50-day rampage were common. Many of these doxings were inaccurate, a result of faulty inferences or deliberate attempts to mislead on the part of the LulzSec hackers.