What's new

Tutorial LulzSec Internet activist's/häçking Group

Xerodeu

Eternal Poster
Joined
Jul 18, 2020
Posts
623
Solutions
1
Reaction
1,355
Points
370

LulzSec:​

-Lulz Security, commonly abbreviated as LulzSec, was a You do not have permission to view the full content of this post. Log in or register now. group that claimed responsibility for several high profile attacks, including the compromise of user accounts from You do not have permission to view the full content of this post. Log in or register now. in 2011. The group also claimed responsibility for taking the You do not have permission to view the full content of this post. Log in or register now. website offline.Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse.It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist You do not have permission to view the full content of this post. Log in or register now., who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a You do not have permission to view the full content of this post. Log in or register now.. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. British authorities had previously announced the arrests of two teenagers they allege are LulzSec members You do not have permission to view the full content of this post. Log in or register now. and Topiary.

Initial targets​

The group's first attacks came in May 2011. Their first recorded target was Fox.com, which they retaliated against after they called Common, a rapper and entertainer, "vile" on the You do not have permission to view the full content of this post. Log in or register now.. They leaked several passwords, LinkedIn profiles, and the names of 73,000 X Factor contestants. Soon after on 15 May, they released the transaction logs of 3,100 You do not have permission to view the full content of this post. Log in or register now. in the United Kingdom.You do not have permission to view the full content of this post. Log in or register now.You do not have permission to view the full content of this post. Log in or register now. In May 2011, members of Lulz Security gained international attention for häçking the American You do not have permission to view the full content of this post. Log in or register now. (PBS) website. They stole user data and posted a fake story on the site which claimed that You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now. were still alive and living in New Zealand. In the aftermath of the attack, You do not have permission to view the full content of this post. Log in or register now. referred to the responsible group as the "Lulz Boat".You do not have permission to view the full content of this post. Log in or register now.

Lulz Security claimed that some of its häçks, including its attack on PBS, were motivated by a desire to defend You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now. A You do not have permission to view the full content of this post. Log in or register now. report on the group quoted one commentator, Brandon Pike, who claimed that Lulz Security was affiliated with the häçktivist group You do not have permission to view the full content of this post. Log in or register now.. Lulz Security claimed that Pike had actually hired it to häçk PBS. Pike denied the accusation and claimed it was leveled against him because he said Lulz Security was a splinter of Anonymous.You do not have permission to view the full content of this post. Log in or register now.

In June 2011, members of the group claimed responsibility for an attack against You do not have permission to view the full content of this post. Log in or register now. that took data that included "names, passwords, e-mail addresses, home addresses and dates of birth for thousands of people."You do not have permission to view the full content of this post. Log in or register now. The group claimed that it used a You do not have permission to view the full content of this post. Log in or register now.,You do not have permission to view the full content of this post. Log in or register now. and was motivated by Sony's legal action against You do not have permission to view the full content of this post. Log in or register now. for You do not have permission to view the full content of this post. Log in or register now. the You do not have permission to view the full content of this post. Log in or register now.. The group claimed it would launch an attack that would be the "beginning of the end" for Sony.You do not have permission to view the full content of this post. Log in or register now. Some of the compromised user information was subsequently used in scams.You do not have permission to view the full content of this post. Log in or register now. The group claimed to have compromised over 1,000,000 accounts, though Sony claimed the real number was around 37,500.You do not have permission to view the full content of this post. Log in or register now.

Corporate attacks​

Lulz Security attempted to häçk into You do not have permission to view the full content of this post. Log in or register now., but both the group and Nintendo itself report that no particularly valuable information was found by the häçkers.You do not have permission to view the full content of this post. Log in or register now. LulzSec claimed that it did not mean to harm Nintendo, declaring: "We're not targeting Nintendo. We like the You do not have permission to view the full content of this post. Log in or register now. too much — we sincerely hope Nintendo plugs the gap."You do not have permission to view the full content of this post. Log in or register now.

On 11 June, reports emerged that LulzSec häçked into and stole user information from the ****ography website You do not have permission to view the full content of this post. Log in or register now.. They obtained and published around 26,000 e-mail addresses and passwords. Among the information stolen were records of two users who subscribed using email addresses associated with the Malaysian government, three users who subscribed using United States military email addresses and 55 users who LulzSec claimed were administrators of other ãdül†-oriented websites. Following the breach, Facebook locked the accounts of all users who had used the published e-mail addresses, and also blocked new Facebook accounts opened using the leaked e-mail addresses, fearing that users of the site would get häçked after LulzSec encouraged people to try and see if these people used identical user name and password combinations on Facebook as well.You do not have permission to view the full content of this post. Log in or register now.

LulzSec häçked into the You do not have permission to view the full content of this post. Log in or register now. network and posted information taken from the network onto the Internet, though they refrained from publishing 200,000 compromised accounts.You do not have permission to view the full content of this post. Log in or register now. LulzSec posted to Twitter regarding the attack, "Bethesda, we broke into your site over two months ago. We've had all of your You do not have permission to view the full content of this post. Log in or register now. users for weeks, Please fix your junk, thanks!"You do not have permission to view the full content of this post. Log in or register now.

On 14 June 2011, LulzSec took down four websites by request of fans as part of their "Titanic Take-down Tuesday". These websites were You do not have permission to view the full content of this post. Log in or register now., You do not have permission to view the full content of this post. Log in or register now., You do not have permission to view the full content of this post. Log in or register now., and IT security company You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now. They also attacked the login servers of the massively multiplayer online game You do not have permission to view the full content of this post. Log in or register now., which also disabled the game's front-facing website, and the You do not have permission to view the full content of this post. Log in or register now. login servers. Most of the takedowns were performed with You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now. On 15 June, LulzSec took down the main server of S2 Games' You do not have permission to view the full content of this post. Log in or register now. as another phone request. They claimed, "Heroes of Newerth master login server is down. They need some treatment. Also, You do not have permission to view the full content of this post. Log in or register now. is better."You do not have permission to view the full content of this post. Log in or register now.

On 16 June, LulzSec posted a random assortment of 62,000 emails and passwords to You do not have permission to view the full content of this post. Log in or register now.. LulzSec stated they released this in return for supporters flooding the You do not have permission to view the full content of this post. Log in or register now. You do not have permission to view the full content of this post. Log in or register now. board.You do not have permission to view the full content of this post. Log in or register now. The group did not say what websites the combinations were for and encouraged followers to plug them into various sites until they gained access to an account. Some reported gaining access to Facebook accounts and changing images to sexual content and others to using the You do not have permission to view the full content of this post. Log in or register now. accounts of others to purchase several books.You do not have permission to view the full content of this post. Log in or register now. Writerspace.com, a literary website, later admitted that the addresses and passwords came from users of their site.You do not have permission to view the full content of this post. Log in or register now.

Operation Anti-Security​

Main article: You do not have permission to view the full content of this post. Log in or register now.
On 20 June, the group announced it had teamed up with Anonymous for "Operation Anti-Security". They encouraged supporters to s†éál and publish classified government information from any source while leaving the term "AntiSec" as evidence of their intrusion. Also listed as potential targets were major banks.You do not have permission to view the full content of this post. Log in or register now. You do not have permission to view the full content of this post. Log in or register now. characterized the operation as an open declaration of You do not have permission to view the full content of this post. Log in or register now. against big government and corporations.You do not have permission to view the full content of this post. Log in or register now. Their first target of the operation was the You do not have permission to view the full content of this post. Log in or register now. (SOCA), a national You do not have permission to view the full content of this post. Log in or register now. of the United Kingdom. LulzSec claimed to have taken the website offline at about 11 am EST on 20 June 2011, though it only remained down for a few minutes.You do not have permission to view the full content of this post. Log in or register now. While the attack appeared to be a DDoS attack, LulzSec tweeted that actual häçking was taking place "behind the scenes". At about 6:10 pm EST on 20 June, SOCA's website went down yet again.You do not have permission to view the full content of this post. Log in or register now. SOCA's website was back online sometime between 20 and 21 June.You do not have permission to view the full content of this post. Log in or register now. The website of the local district government of You do not have permission to view the full content of this post. Log in or register now. in You do not have permission to view the full content of this post. Log in or register now., China, was also knocked offline.You do not have permission to view the full content of this post. Log in or register now. Early in the morning on 22 June, it was revealed that LulzSec's "Brazilian unit" had taken down two Brazilian government websites, You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.You do not have permission to view the full content of this post. Log in or register now. They also brought down the website of Brazilian energy company You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.

On 20 June, two members on the "Lulz Boat" reportedly leaked logs that LulzSec was going to leak on 21 June. They also claimed that the two had leaked information that aided authorities in locating and arresting Ryan Cleary, a man loosely affiliated with the group.You do not have permission to view the full content of this post. Log in or register now. LulzSec posted various personal information about the two on You do not have permission to view the full content of this post. Log in or register now. including You do not have permission to view the full content of this post. Log in or register now. and physical addresses. Both had been involved with cyber-crimes in the past, and one had been involved with häçking the game You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.[You do not have permission to view the full content of this post. Log in or register now.]

After LulzSec encouragement, some began tagging public locations with physical You do not have permission to view the full content of this post. Log in or register now. reading "Antisec" as part of the operation. Numerous beachfronts in You do not have permission to view the full content of this post. Log in or register now. were vandalized with the phrase.You do not have permission to view the full content of this post. Log in or register now. Some local news organizations mistook the graffiti in Mission Beach as signs of the You do not have permission to view the full content of this post. Log in or register now.. Many commenters on the local news websites corrected this.You do not have permission to view the full content of this post. Log in or register now.

On 23 June, LulzSec released a number of documents pertaining to the You do not have permission to view the full content of this post. Log in or register now., which they titled "chinga la migra", which roughly translates to "**** the border patrol". The leaked items included email addresses and passwords, as well as hundreds of documents marked "sensitive" or "for official use only". LulzSec claimed that this was in protest of the You do not have permission to view the full content of this post. Log in or register now. passed in Arizona requiring some aliens to carry registration documents at all times.You do not have permission to view the full content of this post. Log in or register now.You do not have permission to view the full content of this post. Log in or register now. Arizona officials have confirmed the intrusion.You do not have permission to view the full content of this post. Log in or register now. Arizona police have complained that the release of officer identities and the method used to combat gangs could endanger the lives of police officers.You do not have permission to view the full content of this post. Log in or register now.

On 24 June 2011, LulzSecBrazil published what they claimed were access codes and passwords that they used to access the Petrobras website and employee profile data they had taken using the information. Petrobras denied that any data had been stolen, and LulzSecBrazil removed the information from their Twitter feed a few hours later.You do not have permission to view the full content of this post. Log in or register now. The group also released personal information regarding You do not have permission to view the full content of this post. Log in or register now. You do not have permission to view the full content of this post. Log in or register now. and You do not have permission to view the full content of this post. Log in or register now. You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.

On 25 June 2011, LulzSec released what they described as their last data dump. The release contained an enormous amount of information from various sources. The files contained a half You do not have permission to view the full content of this post. Log in or register now. of internal information from telecommunication company You do not have permission to view the full content of this post. Log in or register now., including information relating to its release of You do not have permission to view the full content of this post. Log in or register now. LTE and details pertaining to over 90,000 personal phones used by You do not have permission to view the full content of this post. Log in or register now.. The You do not have permission to view the full content of this post. Log in or register now. of several large corporations including Sony, You do not have permission to view the full content of this post. Log in or register now., and You do not have permission to view the full content of this post. Log in or register now., You do not have permission to view the full content of this post. Log in or register now., and You do not have permission to view the full content of this post. Log in or register now. were included.You do not have permission to view the full content of this post. Log in or register now.You do not have permission to view the full content of this post. Log in or register now. It also contained over 750,000 username and password combinations from several websites,You do not have permission to view the full content of this post. Log in or register now. including 200,000 email addresses, usernames, and encrypted passwords from häçkforums.net; 12,000 names, usernames, and passwords of the You do not have permission to view the full content of this post. Log in or register now. online bookshop; half a million usernames and encrypted passwords of players of the online game You do not have permission to view the full content of this post. Log in or register now.; 50,000 usernames, email addresses, and encrypted passwords of various video game forum users; and 29 users of Priority Investigations, an Irish You do not have permission to view the full content of this post. Log in or register now. company. Also included were an internal manual for You do not have permission to view the full content of this post. Log in or register now. engineering staff and a screencapture of a vandalized page from You do not have permission to view the full content of this post. Log in or register now., the website of the You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now. Members of the group continued the operation with members of Anonymous after disbanding.You do not have permission to view the full content of this post. Log in or register now.

Denied attacks​

The media reported a number of attacks, originally attributed to LulzSec, that the group later denied involvement in. On 21 June, someone claiming to be from the group posted on Pastebin that they had stolen the entire database of the You do not have permission to view the full content of this post. Log in or register now.. LulzSec responded by saying that they had obtained no such data and that whoever posted the notice was not from the group. British officials said they were investigating the incident, but have found no evidence that any databases had been compromised or any information taken.You do not have permission to view the full content of this post. Log in or register now. The British government, upon concluding their investigation, called the claims that any information on the census was taken a You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.

In June 2011, assets belonging to newspaper publisher You do not have permission to view the full content of this post. Log in or register now. were attacked, apparently in retaliation for reporting by You do not have permission to view the full content of this post. Log in or register now. of the arrest of Ryan Cleary, an associate of the group. The newspaper's website and a computer used in the publishing process of You do not have permission to view the full content of this post. Log in or register now. were attacked.You do not have permission to view the full content of this post. Log in or register now. However, LulzSec denied any involvement, stating "we didn't attack The Sun or The Times in any way with any kind of DDoS attack".You do not have permission to view the full content of this post. Log in or register now. Members of AntiSec based in Essex England claimed responsibility for the attack.

häçker actions against LulzSec​

A number of different häçkers have targeted LulzSec and its members in response to their activities. On 23 June 2011, You do not have permission to view the full content of this post. Log in or register now. reported that rival häçker group You do not have permission to view the full content of this post. Log in or register now. were responsible for outing web designer Sven Slootweg, who they said used the online nickname Joepie91,You do not have permission to view the full content of this post. Log in or register now. and that they have intentions to do the same with every member.You do not have permission to view the full content of this post. Log in or register now. A Pastebin post in June 2011 from häçker KillerCube identified LulzSec leader Sabu as You do not have permission to view the full content of this post. Log in or register now., an identification later shown to be accurate.You do not have permission to view the full content of this post. Log in or register now.

A group calling themselves Team Web Ninjas appeared in June 2011 saying they were angry over the LulzSec release of the e-mail addresses and passwords of thousands of normal Internet users. They attempted to publicly identify the online and real world identities of LulzSec leadership and claimed to do so on behalf of the group's victims.You do not have permission to view the full content of this post. Log in or register now. The group claimed to have identified and given to law enforcement the names of a number of the group's members, including someone they claimed is a You do not have permission to view the full content of this post. Log in or register now..You do not have permission to view the full content of this post. Log in or register now.

The Jester, a häçker who generally went by the You do not have permission to view the full content of this post. Log in or register now. handle th3j35t3r, vowed to find and expose members of LulzSec.You do not have permission to view the full content of this post. Log in or register now. Claiming to perform häçks out of a sense of American patriotism,You do not have permission to view the full content of this post. Log in or register now. he attempted to obtain and publish the real world You do not have permission to view the full content of this post. Log in or register now. of key members, whom he described as "childish".You do not have permission to view the full content of this post. Log in or register now. On 24 June 2011, he claimed to have revealed the identity of LulzSec leader Sabu as an You do not have permission to view the full content of this post. Log in or register now. possibly from New York City.You do not have permission to view the full content of this post. Log in or register now. On 24 June 2011, a häçker allegedly going by the name Oneiroi briefly took down the LulzSec website in what he labelled "Operation Supernova".You do not have permission to view the full content of this post. Log in or register now. The Twitter page for the group also briefly became unavailable.You do not have permission to view the full content of this post. Log in or register now.

On 24 June 2011, You do not have permission to view the full content of this post. Log in or register now. published leaked logs from one of the group's IRC channels.You do not have permission to view the full content of this post. Log in or register now. The logs were originally assumed to have been leaked by a disillusioned former member of the group who went by the nickname m_nerva,You do not have permission to view the full content of this post. Log in or register now. yet fellow häçker Michael Major, known by his handle 'hann', later claimed responsibility.You do not have permission to view the full content of this post. Log in or register now. After confirming that the leaked logs were indeed theirs, and that the logs revealed personal information on two members who had recently left the group due to the implications of attacking the FBI website, LulzSec went on to threaten m_nerva on their Twitter feed.You do not have permission to view the full content of this post. Log in or register now. LulzSec claimed the logs were not from one of their core chatting channels, but rather a secondary channel used to screen potential backups and gather research.You do not have permission to view the full content of this post. Log in or register now.

A short time before LulzSec claimed to be disbanding, a group calling itself the A-Team posted what they claimed was a full list of LulzSec members online along with numerous chat logs of the group communicating with each other. A rival häçker going by the name of TriCk also claimed to be working to reveal the group's identities and claimed that efforts on the part of rival häçkers had pushed the group to disband for fear of being caught

(Source:WikiPedia)
 
Back
Top