Lulzsec.....

They DDoSed the SOCA website yesterday....
http://twitter.com/#!/LulzSec/status/82836801731043328

Then...
http://www.bbc.co.uk/news/technology-13859868
A teenager has been arrested in a joint Scotland Yard and FBI investigation into the hacking of websites.

The 19-year-old man was held during a raid at a house in Wickford, Essex.

On Monday, the UK's Serious Organised Crime Agency (Soca) took its website offline after it was attacked by Lulz Security hackers.

Scotland Yard would not confirm the arrest was connected but did say that it followed a series of distributed denial of service (DDoS) attacks.

The raid in Essex was a "pre-planned, intelligence-led" operation, it said.

The teenager was arrested under the Computer Misuse Act and Fraud Act and is being questioned at a central London police station.

He was arrested by the Metropolitan Police's e-crime unit.

A Scotland Yard spokesman said: "The arrest follows an investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.

"Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material. These forensic examinations remain ongoing."

Scotland Yard is co-operating with the FBI as well as Essex Police.


...and now....This better not be true.....!!!! :(:mad::eek:


The UK's Office and National Statistics and Lockheed Martin are racing to check whether hacker group LulzSec had gotten its hands on this year's census data.

Such a massive data loss would be embarrassing even for a government with such an amazing record of data protection failures.

LulzSec's Twitter page has no mention of the supposed hack, but a message on PasteBin - which is open to anyone - suggests they have obtained the records.

The message said:

Greetings Internets,

We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release)

It then warns that the database will be put on the Pirate Bay once the re-formatting has been finished.

We're waiting to hear back from Lockheed Martin and the Office for National Statistics.

The census collected information from 25 million UK households in March.

Lockheed Martin, lead contractor for the census, did suffer from the failure of RSA security tokens earlier this month and admitted an intrusion into its network thanks to RSA's failure.

Hat tip to The Next Web for spotting the post.

The PasteBin post is here.

Keep an eye on LulzSec's Twitter feed here, for confirmation.

The ONS sent us this: "We are aware of the suggestion that census data has been accessed. We are working with our security advisers and contractors to establish whether there is any substance to this. The 2011 Census places the highest priority on maintaining the security of personal data. At this stage we have no evidence to suggest that any such compromise has occurred."
http://www.theregister.co.uk/2011/06/21/uk_census_lost/
 
http://news.sky.com/skynews/Home/UK...enager_Suspected_Of_Being_Mastermind_Arrested

A 19-year-old suspected of being a mastermind behind notorious international computer hacking group LulzSec has been arrested in Essex, after a joint operation by the FBI and Scotland Yard.

It comes just days after the group claimed it brought down the US Central Intelligence Agency's website.

The alleged hack on CIA.gov occurred on the same day the group opened a telephone request line so its fans could suggest potential targets.

On Twitter, the group wrote: "Tango down - CIA.gov - for the lulz".

The teenager is being questioned under the Computer Misuse Act and Fraud Act.

He was arrested by officers from the force's e-crime unit.

A Scotland Yard spokesman said: "The arrest follows an investigation into network intrusions and distributed denial of service attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.

"Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material.

"These forensic examinations remain ongoing."

The Met and Essex Police are working "in cooperation" with the FBI, the spokesman said.

The teenager remains in custody at a central London police station.
 
Well, they say they didn't hack hte Census...

Just saw the pastebin of the UK census hack. That wasn't us - don't believe fake LulzSec releases unless we put out a tweet first.
http://twitter.com/#!/LulzSec/status/83172089711964161

Also just been reading about 'Ryan Cleary' The guy that got arrested.

Seems he aint part of Lulzsec and the media have just, as usual, got it wrong.... :lol:

Also, look at Lulzsec Twitter....

http://twitter.com/#!/LulzSec
Seems the glorious leader of LulzSec got arrested, it's all over now... wait... we're all still here! Which poor bastard did they take down?

Ryan Cleary is not part of LulzSec; we house one of our many legitimate chatrooms on his IRC server, but that's it.

Clearly the UK police are so desperate to catch us that they've gone and arrested someone who is, at best, mildly associated with us. Lame.
 
Looks like this is going to rumble on for quite some time :wall:

If the census data has actually been stolen (by someone else) this is going to get serious pretty quick :eek:.
 
Myself, I think it's dead funny if they have hacked all the census data.

Listen, it doesn't really matter, lulz are only collecting what that big cream and green building at Vauxhall know about you anyway.

Surreptitious fingerprinting, data collecting, dna sampling and personal dossiers on every known uk citizen has been the norm for years.

Just a shame they didn't catch all them 07/07 bombers with their snooping eh?

lulz have shown just how much internet concerns care about your security - not a lot.
 
Man charged with hacking offences

22 June 2011

A 19-year-old man has this afternoon been charged with offences under the Criminal Law Act and Computer Misuse Act by officers from the Metropolitan Police Service's Police Central e-Crime Unit (PCeU).

Ryan Cleary of South Beech Avenue, Wickford, SS11, is charged as follows:

1. On or before the 20th of June 2011 you did conspire with other person or persons unknown to conduct unauthorised modification of computers by constructing and distributing a computer program to form a network of computers (a Botnet) modified and configured to conduct Distributed Denial of Service attacks, intending thereby to impair the operation of computers or to prevent or hinder access to any program or data on such computers or impair the operation of a program or the reliability of data held in such a computer

Contrary to Section 1 Criminal Law Act 1977.

2. On 20th June 2011 did an unauthorised act namely a Distributed Denial of Service attack against the website of the Serious Organised Crime Agency, at a time when you knew that it was unauthorised either intending by doing the act or being reckless as to whether the act would enable the operation of a computer to be impaired, access to a program or data held in a computer to be prevented or hindered, or the operation of a program or the reliability of data held in a computer to be impaired.

Contrary to S. 3 Computer Misuse Act 1990.

3. On 28th November 2010 did an unauthorised act namely a Distributed Denial of Service attack against the website of the International Federation of the Phonographic Industry (IFPI), at a time when you knew that it was unauthorised either intending by doing the act or being reckless as to whether the act would enable the operation of a computer to be impaired, access to a program or data held in a computer to be prevented or hindered, or the operation of a program or the reliability of data held in a computer to be impaired.

Contrary to S. 3 Computer Misuse Act 1990.

4. On 29th October 2010 did an unauthorised act namely a Distributed Denial of Service attack against the website of the British Phonographic Industry (BPI) , at a time when you knew that it was unauthorised either intending by doing the act or being reckless as to whether the act would enable the operation of a computer to be impaired, access to a program or data held in a computer to be prevented or hindered, or the operation of a program or the reliability of data held in a computer to be impaired.

Contrary to S. 3 Computer Misuse Act 1990.

5. On or before the 20th June 2011 you made, adapted, supplied or offered to supply an article, namely a Botnet, intending that it should be used to commit, or to assist in the commission of, an offence under section 3 of the Computer Misuse Act 1990., namely a Distributed Denial of Service attack.

Contrary to S. 3A Computer Misuse Act 1990.

He is due to appear in custody at City of Westminster Magistrates Court tomorrow morning (Thursday June 23).

http://content.met.police.uk/News/Man-charged-with-hacking-offences/1260269119954/1257246745756


Cant believe the press are still saying he's the 'Lulzsec Mastermind' :fool:
 
Oh, media words 'mastermind' 'notorious' etc ad nauseum.

When I worked for a newspaper/agency this guy actually compiled a 'buzzword' dictionary you could apply to any news story.

You entered the news story subject, cross-referenced, then were given a choice of words.

Those words haven't changed in 'popular' journalism in 50 years, possibly 100 years.

Possibly because those words still rile folks up, I dunno.

Wickford? I've worked in Wickford, and nearby Maldon too. Maldon's almost nice, Wickford is bland. It's a UK town that could be anywhere on this tiny island, decidedly boring,.

So it goes :)
 
Lol Let them try and hack as much as they want my money and details...all wrapped flimsily in sellotape and boxed in a cornflakes box under my owned mattress...but not at my house...Lets see how they do that ...£10 for the "ELITE" hacker that finds it....:lol:...Lets go back to Wage packets and. all that ...:D
 
http://www.zeropaid.com/news/93919/lulzsecs-first-secret-document-dump-hits-web-one-day-early/

According to LulzSec’s posting on The Pirate Bay, the document dump consists of secret documents for Arizona’s police department. From the release notes:
We are releasing hundreds of private intelligence bulletins, training manuals, personal email correspondence, names, phone numbers, addresses and passwords belonging to Arizona law enforcement. We are targeting AZDPS specifically because we are against SB1070 and the racial profiling anti-immigrant police state that is Arizona.
The documents classified as “law enforcement sensitive”, “not for public distribution”, and “for official use only” are primarily related to border patrol and counter-terrorism operations and describe the use of informants to infiltrate various gangs, cartels, motorcycle clubs, Nazi groups, and protest movements.
Every week we plan on releasing more classified documents and embarassing personal details of military and law enforcement in an effort not just to reveal their racist and corrupt nature but to purposefully sabotage their efforts to terrorize communities fighting an unjust “war on drugs”.
Hackers of the world are uniting and taking direct action against our common oppressors – the government, corporations, police, and militaries of the world.
See you again real soon! ;D
The file is 446.6 MB, so it’s no small file dump either when it comes to secret material. The question, at this point, becomes, what are the specifics of this content anyway? It is very likely going to require a certain amount of crowdsourcing to figure out for those who are gutsy enough to download the file


tCp90.gif
 
Judging by the pics of that Ryan kid in the Star the other day, is he even capable of using a PC ? He was so trollied on lighter gas, I don't think he even knew what planet he was on :lol:
 
I saw an article just the other day that said something to the effect that "he only played a minimal part in hosting some chat rooms for Lulzsec."

I don't have the article handy. They were laughing about it simply because the gov't believes they have someone of importance..
 
I saw an article just the other day that said something to the effect that "he only played a minimal part in hosting some chat rooms for Lulzsec."

I don't have the article handy. They were laughing about it simply because the gov't believes they have someone of importance..


This might not be the same article, but it does mention the chat logs and, that how Cleary is mentioned "in less than glowing terms."

http://www.thinq.co.uk/2011/6/24/lulzsec-chat-logs-shed-light-clearys-role/
 
This might not be the same article, but it does mention the chat logs and, that how Cleary is mentioned "in less than glowing terms." [/SIZE]
http://www.thinq.co.uk/2011/6/24/lulzsec-chat-logs-shed-light-clearys-role/http://www.thinq.co.uk/2011/6/24/lulzsec-chat-logs-shed-light-clearys-role/

It looks very similar to the one i saw. the little picture and format is the exact same, but some of the text is clearly not the same. Overall, same concept of the opinion of the guy.
 
Yep, I'm sure the main guys were getting a bit hot under the collar! I wonder if they'll get caught?
 
Be aware, there are report that the AT&T file within the '50 Days of lulz' Torrent contains some kind of Trojan.

http://twitter.com/#!/Skar3/status/85026840560939008



2011-06-26
Thepiratebay just deleted the lulzsec torrent "50 days of lulz" , reason theres some virus in it. Thepiratebay does not allow files that are mislabeled, or contain virus/trojan's, or child pornography. Being as how this torrent was extremely popular, it may have infected 100's of thousands of people already. Lulzsec's account on thepiratebay was not banned so they are cleared to upload the same torrent again without the alleged "trojan".

source: moderator.



additional information:
http://tlan3y.tumblr.com/post/6938716877/
http://activepolitic.com:82/Outside_News/6057.html

update:
AnonymousIRC says they will clean it out and reupload it asap
 
I've no interest in it but is it not possible that the data they took and posted already had the Trojan?

I think that's more likely than the lulz peeps purposely passing on an infection.

They seem to be trying to gain the average folk's support rather than ostracise them after all.

And of course it's quite possible goverment spooks could have planted the Trojan to discredit the hackers.

Believe or trust nobody, and thus has it always been.
 
http://www.tgdaily.com/security-features/57673-dhs-issues-anonymous-threat-assessment

The US Department of Homeland Security (DHS) has issued an unclassified threat assessment detailing the tactics and capabilities of Anonymous.


Although the DHS claimed Anonymous hasn't demonstrated "any capability" to damage critical infrastructure, the department did (grudgingly) acknowledge that certain members have displayed "moderately higher levels" of skill and creativity - as is evidenced in operations where a combination of methods and techniques were employed to target multiple networks.

"Though the TTPs and tools employed by Anonymous are commonly thought to be rudimentary and unsophisticated, their success to date executing operations and gaining media attention is on par with high profile incidents allegedly involving sophisticated 'Advanced Persistent Threat' (APT) actors," the authors of the assessment concluded. 


"They have relied on taking advantage of weaknesses in applications, thus allowing them to bypass, at least initially, conventional network defenses such as firewalls and anti-virus applications to access sensitive data."





As such, the report recommends that various government agencies and private sector partners ensure processes are in place to notify leadership and network operators if their organizations becomes a possible target by hacktivists or other malicious actors. 



Mebees the government boys should spend less on sharp suits and sunglasses and use the money to hire some good security people. :D
 
Mebees the government boys should spend less on sharp suits and sunglasses and use the money to hire some good security people

What do you think they're doing now? :lol:

All the good hackers end up getting gov't jobs anyway.
 
Back
Top