Search This Blog

Powered by Blogger.

Blog Archive

Labels

Showing posts with label LulzSec Reborn. Show all posts

TweetGif hacked and 10,000 Twitter Users data dumped by LulzSec Reborn



The hacker group known as "LulzSec Reborn" claimed to have hacked into the TweetGif website (tweetgif.com) and compromised the database. TweetGif is a thirt-party twitter app that lets users share animated GIFs.

After the security breach, the hackers dumped a part of database that containing the credentials for more than 10,000 Twitter accounts. The dump contains access tokens and the associated access token secrets which can be used to access users' Twitter accounts.

The leak also contains users names, locations, bio information, links to avatars, and the date of the last update.

The tokens remain valid even when the account password is changed. If you used the app, all you need to do is head into Twitter's settings and revoke access to the app—no massive password changes required.

LulzSec Reborn hacked Military Dating and CSS Corp sites


A Group of hackers claiming to be the reborn LulzSec hacked into Military Dating site(MilitarySingles.com) and CSS Corp sites .

Earlier today, The hackers  leaked around 170,000 accounts from MilitarySingles.com on pastebin as par of the operation Digiturk. The leak contains names,usernames,e-mail address, encrypted-passwords and other details.


"At this time there is no actual evidence that MilitarySingles.com was hacked and it is possible that the Tweet from Operation Digiturk is simply a false claim." Someone claiming to be the administrator of MilitarySingles.com posted a comment on DataBreaches.

After seeing the admin's statement, 'LulzSec Reborn' called the admin 'stupid' and defaced a page to demonstrate the access to the site.

"Stupid Administrator ‘There is no evidence militarysingles is hacked’ Well guess what? [link-to-defaced-page]" LulzSec Reborn Twitter account says.

Following this attack, hackers also targeted the CSS Corp website(csscorp.com) and leaked database. The leak contains sensitive information including E-mail address,password(plain-text),username and more details.

"And admins from CSS Corp I know that you are smarter than the others please don't search for proof we will delete your whole database" LulzSec Reborn said in twitter.

LulzSecReborn said it is not affiliated to the original LulzSec group and has no knowledge regarding the authenticity of LulzSec's rumoured April Fools' Day return.

"We are not the old LulzSec. The idea is to continue what some have started and never managed to finish. At the same time we want to avenge the ones that were arrested," Softpedia quoted one group member as saying.