LulzSec Hackers Face a Leak of Their Own: Read the Group’s IRC Chatroom Logs


LulzSec, the hacker network that gained notoriety over the last few weeks thanks to leaking large databases of user names and passwords from a wide variety of sites and service, now faces a leak of its own. The Guardian received and published logs from LulzSec’s own private chatroom today that give us a bit more insight into how this group operates. Judging from these logs, LulzSec is apparently a group of about 6 to 8 hackers and not the massive network of security experts that LulzSec pretends to be.


5:40 pm

Hackers Take Down Australian Web Host, Leave 4,800 Sites Unrecoverable


There has been a frenzy of hacking activity over the last few weeks from organizations like LulzSec and others that affected a number of major brands ranging from Sony to Citibank. Over the weekend, Australian domain registrar and web host Distribut.IT was the victim of a “deliberate, premeditated and targeted attack” on its servers. At first glance, this looks like a typical case of cyber vandalism. What’s different about this event, though, is that the hackers didn’t just steal information or deface the compromised sites. Instead, they actually managed to destroy so much information that, according to the Sidney Morning Herald, at least 4,800 of the sites hosted on the company’s servers are now completely “unrecoverable.” (more…)

4:00 am

Has Lulzsec Leaked Your Data Online? Here’s a Simple Tool to Check


Over the last few months, we witnessed the rise of a new hacker group that works under the name Lulzsec. So far, they have hacked into networks from organizations that range from Sony BMG to Nintendo, and PBS. In doing so, they have retrieved thousands of names, passwords and other personal data from unsuspecting users. While most of these organizations then go on and sell this information on the black market, Lulzsec regularly releases all of the data it collects online (they are, after all, just doing it for the ‘lulz’). Now, a new tool helps you to find out if any of your own personal data was made public in one of these leaks.

The above widget allows you to just type in your email address and see if any of your data is available in one of Lulzsec’s releases. It’s hosted by cloud hosting company cloudControl, but the author apparently wants to remain anonymous. Our friends from The Next Web assure us that there is no email harvesting or other shenanigans involved here, though. Update: For those worried about this widget harvesting emails, I have confirmed the identity of the developer and it does indeed do what it promises to do. The group behind this tool wants to remain anonymous to ensure they don’t get hacked by Lulzsec themselves.

We can safely assume that Lulzsec hasn’t released all of the data it has amassed yet. Just today, the group released another file with more than 60,000 email addresses and passwords. Chances are that this is just the tip of the iceberg.

[via: The Next Web]

Enhanced by Zemanta

6:50 pm