LulzSec disbands with parting hack

Options
joshuaboy
joshuaboy Members Posts: 10,858 ✭✭✭✭✭
edited June 2011 in IllGaming
LulzSec has announced it has disbanded – but not without one last hack.

Its "planned 50 day cruise has expired," the group said on Twitter, "and we must now sail into the distance." A bit like that boring bit at the end of The Lord of the Rings, then.

In a parting shot, LulzSec claimed to have released the user names and passwords of over 750,000 accounts gathered from several gaming forums and the Battlefield Heroes beta. The leaked information is now online. It's probably worth changing your password. Again.

The Battlefield Heroes website is down as a result. "Service on the Battlefield Heroes free-to-play site has been temporarily halted while we investigate a security breach," EA said in a statement.

"Our investigation is ongoing however it appears that screen names and encrypted passwords associated with an early beta version of Heroes has been compromised. To the best of our knowledge, it appears that no personal data was compromised.

"No emails, account history, credit card numbers or payment methods. Any further updates will be posted on this page. We apologize for any inconvenience and hope to have the game back online shortly."

In a press release of sorts, LulzSec claimed it was made up of "a crew of six" and its 50 days of "lulz" had been planned from the beginning.

LulzSec has claimed responsibility for a number of attacks on video game companies. Its attack on Sony, it said, was motivated by the Japanese company's pursuit of PlayStation 3 jailbreaker George Hotz.

It went on to hack or attack companies and video games including Nintendo, Bethesda, Minecraft, League of Legends and Eve Online.

LulzSec's decision to quit comes just a week after UK authorities arrested 19 year-old Essex man Ryan Cleary in connection with computer-related offences.

It also follows an apparent attack on LulzSec itself from an anti-hacker group calling itself the A-Team.

It posted what it said were the real names and locations of LulzSec's most senior members in the UK, US and Sweden, along with transcripts of their conversations. Has this sent LulzSec underground?

Comments

  • mindright
    mindright Members Posts: 2,393 ✭✭✭✭
    edited June 2011
    Options
    so after all that damage, now they decided to disband...

    smh
  • Swiffness!
    Swiffness! Members Posts: 10,128 ✭✭✭✭✭
    edited June 2011
    Options
    another hack group known as "Web Ninjas" has been sonning Lulzsec hard, exposing they members, structure, leadership, etc...

    http://lulzsecexposed.blogspot.com/

    They got personal data (address, phone, job, etc...) on 'em, but they said they sent it to the FBI instead, LOL GAME OVER, NO CONTINUES.
  • Swiffness!
    Swiffness! Members Posts: 10,128 ✭✭✭✭✭
    edited June 2011
    Options
    It's been a week we have started our blog and we have accomplished so many things, Let's list few of them

    - A week back, only few of us like Ninjas, Jester, Awinee and few others in close circle knew who were Lulzsec but now whole world knows who are the leaders and members of this group.

    - We have provided enough evidence to prove that LulzSec were Anonymous

    - We have published the chat logs of LulzSec so that Security Analysts, Investigative reporters and other Enthusiasts can work on the logs and confirm for themselves. We are 99% sure that our dox are correct but still there would be 1% error in anything.

    - We made LulzSec accept that the logs are real and not fake or disinformation campaign as many thought earlier.

    - Media guys can now reach out to the top members of LulzSec (For e.g Wired)

    - We neither wanted fame nor publicity, then why did we publish their dox and chat logs inspite of sending info to security agencies? - We did this to humiliate them in the same way they did with hack victims.

    Love,
    Web Ninjas

    lmao damn