top | item 2696848

LulzSec: 50 Days of Lulz statement

164 points| brodd | 14 years ago |pastebin.com

91 comments

order
[+] ianterrell|14 years ago|reply
Considering they'd even earlier today advertised a Monday booty release, I suspect that, rather than abandoning the Lulzsec facade after 50 days, it's that the fuzz is a little too hot on their trail for comfort.
[+] 46Bit|14 years ago|reply
I'd have to agree. Even now I think that with time they will all be outed - if they've not already. Some of these 'raids' have just been too daring to expect to get away with forever.
[+] kristofferR|14 years ago|reply
Damn, the AT&T-release is especially juicy. It contains a lot of highly confidential information about technology and strategy that their competitors would love to get their hands on.

I'm a quite technical guy and I barely understand a thing. No wonders AT&T are having troubles with fixing their network troubles, it looks like a massive, massive beast of technology.

I found the frequency chart fascinating. It's available publicly here: http://www.ntia.doc.gov/osmhome/allochrt.pdf

[+] ender7|14 years ago|reply
Given the juiciness of this, I'm surprised that more companies don't have corp espionage groups to carry out little lulsec attacks.
[+] Skywing|14 years ago|reply
My first job out of college was at Nortel, coding their 4G data network infrastructure. I still think I only understood about 20% of the big picture by the time I left. So many moving parts, massive code base and tons of acronyms.
[+] unknown|14 years ago|reply

[deleted]

[+] aklemm|14 years ago|reply
What about analyzing their writing? They release quite a bit of text...somebody likes to write. Considering there are efforts to identify people by typing patterns, I wonder if this is how they'll get caught: http://petsymposium.org/2011/papers/hotpets11-final8Chairunn...
[+] tsumnia|14 years ago|reply
Unfortunately given the scope of that paper, it doesn't sound like typing patterns can be used just yet. A sample size of 36 participants doesn't handle the scale involved when going against 'The Internet'.

Also, the paper collected timestamps of each keystroke, something that'd need to done on suspects; however, if they are already suspecting you, they probably have other ways to identify you.

Finally, how in the world does a paper like this get away with having 'nowadays' in it? I know its a legit word, but, just seems awkward.

[+] dmix|14 years ago|reply
NATO press release about the break in to their ebookstore by LulzSec:

http://www.nato.int/cps/en/SID-40BE0A99-F4F5EB32/natolive/ne...

[+] ianterrell|14 years ago|reply
Note that the press release was two days ago, after NATO was notified by police. AFAIK, this is the first that Lulzsec has disclosed that the NATO bookstore was hit, which means the police knew before we did. That can't be good for those behind the mask.
[+] jfb|14 years ago|reply
NATO has an ebook store? What are the hell?
[+] estel|14 years ago|reply
The torrent appears to contain hacked personal data from:

* EA (Battlefield Heroes) * Hackforums.net * Nato-bookshop.org * Misc other forums

The first of these purports to be 200K+ users.

[+] Strom|14 years ago|reply
The Battlefield Heroes passwords are unsalted MD5. Way to go EA.
[+] ianterrell|14 years ago|reply
Also of note, AOL and AT&T data. AT&T's rar is 329.9 MB.
[+] lhnz|14 years ago|reply
Quitting or rebranding is the question I find myself asking.
[+] BasDirks|14 years ago|reply
Like a wave they will again become sea, only to rise later as a different wave.

Or to put my high school poetics into plain English:

They will want to blend in with the Anonymous masses, until they deem it safe to once again to craft new identities for themselves.

[+] chao-|14 years ago|reply
Given that the LulzSec name was a clique from AnonOps rebranding itself to begin with, I would bet on the latter. Although it may be a while before we hear of them pulling such flamboyant stunts again.
[+] skeltoac|14 years ago|reply
Odds that one of the crew is commenting on this thread?
[+] cantbecool|14 years ago|reply
Looks like they were a getting a bit anxious that they were going to be outed, which will ultimately still happen anyway. Regardless, it was a fun reading their Pastebins and Twitter feeds every few days making a mockery of multiple corporations information security.
[+] Tichy|14 years ago|reply
How is it possible to register a .com domain in an anonymous way?
[+] trotsky|14 years ago|reply
prepaid visa or just get someone who doesn't know you very well to do it
[+] shareme|14 years ago|reply
Yup, fuzz on their tails..

Not too smart either why include the number of Lulzsec members?

[+] sbierwagen|14 years ago|reply
1.) What useful information does "there are six of them" convey?

2.) What makes you think that they're not lying?

[+] Mad_Dud|14 years ago|reply
It doesn't have to be true.
[+] alvivar|14 years ago|reply
I guess is part of the concept... transparency, clarity...
[+] tathagatadg|14 years ago|reply
I was trying to search web cache on who used the words lulz and security together before Lulzsec ... and then this final release :|
[+] mrb|14 years ago|reply
Who is LulzSec?
[+] redthrowaway|14 years ago|reply
I was going to say something snarky, but I checked your comment history and it seems you are on here seldom enough to explain an honest lack of knowledge about them. Basically, LulzSec is a hacking group that has been attacking many targets very publicly over the past 2 months. They've been all over HN, /., reddit, etc. They've even earned some mentions in the MSM.

Basically, they're notable for a) the number of targets they've hit, b) how brazen they are about it (hitting the FBI, CIA, and other law enforcement agencies), and c) how vigorously they court publicity (270k followers on Twitter).

[+] Periodic|14 years ago|reply
In a few months I won't know either.