Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label LulzSec. Show all posts

Alleged leader of LulzSec hacking group arrested by Australian Police



The Australian Federal Police(AFP) has reportedly arrested a 24-year-old self-proclaimed leader of LulzSec hacking group.

The arrest comes few days after the LulzSec member was jailed for the SQL Injection attack that allowed him access to the Sony Pictures Entertainment site.

According to the ABC news report,the AFP says the investigation began less than two weeks ago when investigators found a government website had been breached.

The report didn't reveal the man's identity who has been charged with the two counts of unauthorised modification of data to cause impairment and one count of unauthorised access to a restricted computer system.

Sabu is still helping FBI, Gets 6-Month Sentencing Delay


It's been almost one year since the leader of the Lulzsec collective 'Sabu' started to work for the FBI as an informer. He should have been sentenced on August 22, but the sentencing is postponed for six months due to his continued cooperation with the feds.

Hector Xavier Monsegur, a 28-year-old New Yorker who used the online name “Sabu,” has been working undercover for the feds since the FBI arrested him without fanfare June,2011.

Monsegur provided agents with information that helped them arrest several suspected members of LulzSec and Antisec, including two men from Great Britain, two from Ireland and an American in Chicago.


It was unclear from the court filing Tuesday whether Monsegur continues to be active online or is simply aiding the government in its prosecutions of those already arrested, according to Wired.
 
“The Government respectfully submits this letter to request a six-month adjournment of the August 22, 2012, sentencing control date set in the above-captioned matter in light of the defendant’s ongoing cooperation with the Government. Pursuant to his cooperation agreement, the defendant consents to the requested adjournment,” the court document reads.

Panda Security site Hacked and database compromised by @LulzSecMx


A Hacker called as @LulzSecMx, claimed to have unauthorized access to one of the biggest Anti-virus providers, 'Panda Security' website and leaked the database in pastebin. The attack announced via @LulzSecMx .

"pandasecurity.com, best known for its antivirus shit we have a message for you: D" Hacker said.

 "We entered through the back door, they have earned money by working with police to be on the lookout and inform activists, your page as your antivirus is bullshit!"

The leak contains email address, encrypted passwords and some other confidential data compromised from the PandaSecurity.com website.

Accused LulzSec Hacker pleads guilty in Sony breach


LulzSec hacker 'Cody Kretsinger' has pleaded guilty on Thursday in Federal court in California to charges of taking part in an extensive computer breach against Sony.


Kretsinger, 24, pleaded guilty to one count each of conspiracy and unauthorized impairment of a protected computers in  a deal with prosecutors.LulzSec, an offshoot of the international hacking group Anonymous, has taken credit for hacking government and private sector websites.

"I joined LulzSec, your honor, at which point we gained access to the Sony Pictures website," Kretsinger told the judge after entering his guilty plea.

He and other LulzSec hackers, including those known as "Sabu" and "Topiary," stole the personal information of thousands of people after launching an "SQL injection" attack on the website, and ultimately caused Sony Pictures Entertainment more than $600,000 in damages, Assistant U.S. Attorney Eric Vandevelde said.

Sentencing is scheduled for for July 26, he faces up to 15 years in prison but it is thought likely he will receive a much lower sentence.

Alleged LulzSec hacker 'Ryan Cleary' is back in jail for Emailing Sabu

The alleged LulzSec hacker is back behind bars for breaking his bail conditions.

Ryan Cleary, 19-year-old, who allegedly ran the Internet Relay Chat rooms(IRC) used by the group, was arrested last year but released on bail with some conditions.

Cleary was ordered not to use the Internet , but apparently broke the bail conditions byemailing Hector Xavier Monsegur, better known as Sabu, last Christmas, the Inquirer report says.

As a result, once again he was arrested on 5 March, the day before other Anonymous-linked hackers were arrested and the US Federal Bureau of Investigation (FBI) went public with the news that Sabu had turned informant.

LulzSec Reborn hacked Military Dating and CSS Corp sites


A Group of hackers claiming to be the reborn LulzSec hacked into Military Dating site(MilitarySingles.com) and CSS Corp sites .

Earlier today, The hackers  leaked around 170,000 accounts from MilitarySingles.com on pastebin as par of the operation Digiturk. The leak contains names,usernames,e-mail address, encrypted-passwords and other details.


"At this time there is no actual evidence that MilitarySingles.com was hacked and it is possible that the Tweet from Operation Digiturk is simply a false claim." Someone claiming to be the administrator of MilitarySingles.com posted a comment on DataBreaches.

After seeing the admin's statement, 'LulzSec Reborn' called the admin 'stupid' and defaced a page to demonstrate the access to the site.

"Stupid Administrator ‘There is no evidence militarysingles is hacked’ Well guess what? [link-to-defaced-page]" LulzSec Reborn Twitter account says.

Following this attack, hackers also targeted the CSS Corp website(csscorp.com) and leaked database. The leak contains sensitive information including E-mail address,password(plain-text),username and more details.

"And admins from CSS Corp I know that you are smarter than the others please don't search for proof we will delete your whole database" LulzSec Reborn said in twitter.

LulzSecReborn said it is not affiliated to the original LulzSec group and has no knowledge regarding the authenticity of LulzSec's rumoured April Fools' Day return.

"We are not the old LulzSec. The idea is to continue what some have started and never managed to finish. At the same time we want to avenge the ones that were arrested," Softpedia quoted one group member as saying.

AntiSec hacked Panda Security websites to protest LulzSec arrests

 Antisec ,hackers aligned with Anonymous defaced multiple subdomains of the website belong to Panda security after it was revealed that five suspected hackers charged with hacking-related offenses, as well as news that LulzSec leader(Sabu) Hector Xavier Monsegur,  helped FBI  in their probe of the group.

"Yeah yeah, we know, Sabu snitched on us. As usually happens FBI menaced him to take his sons away. We understand, but we were your family too. (Remember what you liked to say?)," reads the defacement message. "It's sad and we can't imagine how it feels having to look at the mirror each morning and see there the guy who shopped their friends to police."

Defacement

Hackers also released were e-mail addresses of people with accounts with Panda, along with their passwords and other internal server details.

The release note on pastebin accused Panda Security of assisting in recent sweeps in Europe and South America that resulted in the arrest of 25 suspected members of Anonymous. 

"Pandasecurity.com, better known for its shitty ANTIVIRUS WE HAVE BACKDOORED, has earning money working with Law Enforcement to lurk and snitch on anonymous activists. they helped to jail 25 anonymous in different countries and they were actively participating" Hackers wrote in the pastebin release.

List of Hacked sites:

  • cybercrime.pandasecurity.com
  • antivirus-offers.pandasecurity.com
  • blog.cloudantivirus.com
  • cloudofficeprotection.pandasecurity.com
  • cloud.pandasecurity.com
  • cloudpartnercenter.pandasecurity.com
  • cloudprotectionbeta.pandasecurity.com.tar.gz
  • cloudprotection.pandasecurity.com
  • facebookfriends.pandasecurity.com
  • forgetsecurity.co.uk
  • forgetsecurity.co.za
  • forgetsecurity.es
  • go.pandasecurity.com
  • info.pandasecurity.com
  • information.pandasecurity.com
  • lavuelta.pandasecurity.com
  • maintenance.pandasecurity.com
  • momentos.pandasecurity.com
  • ondersteuning.pandasecurity.com
  • pandacompetition.pandasecurity.com
  • pandalabs.pandasecurity.com
  • prensa.pandasecurity.com
  • press.pandasecurity.com
  • promo.pandasecurity.com
  • protectyourfamily.pandasecurity.com
  • research.pandasecurity.com
  • securitytothecloud.pandasecurity.com
  • serviciospro.pandasecurity.com
  • servicos.pandasecurity.com
  • suporte.pandasecurity.com
  • techcenter.pandasecurity.com
  • uninstall.cloudantivirus.com
  • wiki.cloudantivirus.com
  • www.cnccs.es
  • www.forgetsecurity.de

LulzSec leader "Sabu" helped FBI to catch other LulzSec hackers

Hector Xavier Monsegur, 28-year-old, alleged LulzSec Leader "Sabu" turned informant after he was secretly arrested last year and provided information to law enforcement which resulted in the arrest on Two continents .

According to FoxNews report, the information provided by Monsegur helps agents to arrest several suspects ,including two men from Great Britain, two from Ireland and an American in Chicago.

“This is devastating to the organization,” said an FBI official involved with the investigation. “We’re chopping off the head of LulzSec.”

Alleged LulzSec leader "Sabu"- Hector Xavier Monsegur

“They caught him and he was secretly arrested and now works for the FBI,” a source close to Sabu told FoxNews.com.

Monsegur pleaded guilty Aug. 15 to 12 hacking-related charges and information documenting his admissions is expected to be unsealed in Southern District Court on Today. As a result of Monsegur’s cooperation, which was confirmed by numerous senior-level officials, the remaining top-ranking members of LulzSec were arrested or hit with additional charges Today morning.

Those arrested on Today including Ryan Ackroyd, aka “Kayla” and Jake Davis, aka “Topiary,” both of London; Darren Martyn, aka “pwnsauce” and Donncha O’Cearrbhail, aka “palladium,” both of Ireland; and Jeremy Hammond aka “Anarchaos,” of Chicago.

Hammond is believed to have have been the main person behind the devastating December hack on U.S. security company Stratfor which resulted in seizure of Millions of emails,credit card numbers and other confidential data.