LulzSec May Say It's Done, But Attacks Aren't Over

Share it on Twitter  
Share it on Facebook  
Share it on Linked in  

So, LulzSec announced that it was done, claiming that the group was "bored." As a mother of a young, twenty-something, self-proclaimed computer geek and gamer, I totally believe that. I've seen my kid and his friends pick up on a new computer application that took all of their attention and effort for days, and then just as suddenly announce they were bored and had moved on. In fact, my kid posted a link to the LulzSec story on his Facebook page with the note, "Only our generation."


Yet, I wasn't surprised when I saw that LulzSec didn't just pack up the computer and go home. It was more like, "I'm bored, I'm going home and here is a lovely parting gift." According to PCMag.com, LulzSec had one more data dump to share. LulzSec's goodbye letter included links to data from AOL, AT&T, online game "Battlefield Heroes," the FBI, NATO, the Navy and more. The article also cautioned that there was a bit of a twist: Files placed on one of the breached locations included a Trojan. According to the article:

Those looking to peruse the data dump might want to exercise caution. A version of the files placed on The Pirate Bay included a trojan, prompting its removal. According to a tweet from Anonymous, the trojan as "not from @lulzsec; material uploaded as received."
"This malware came from AT&T and LulzSec never actually looked at it," Anonymous tweeted again today.

An article at guardian.co.uk mused that LulzSec was disbanding not just because it got bored, but because the group really had no choice. Instead, the article said, the group was running out of targets and had no real agenda to keep it going. The article said:

For a small group, it's easy to run out of steam: what's the agenda? How do you keep it moving? What do you do when you start to exhaust your list of easy targets? Most hackers build up a list of potential targets over time, noting websites that they can probe and get inside and keeping them for later. Finding targets takes time; the more of you in the group and the more skilled you are-and the more carefully you time your releases-the easier it is to keep up a constant stream. Hack a lot of sites in short order and you quickly run out of low-hanging fruit, and you're on to the harder ones.

Of course, just because LulzSec has decided to move on to some new adventure doesn't mean that networks are safe from attacks. An article on CNET warned that the hackers known as Anonymous are ready to pick up the slack. According to the article:

The hacking organization released information to the Web last night that came from the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory (Sentinel) program. The Sentinel program is administered by the U.S. Department of Homeland Security and the Federal Emergency Management Agency (FEMA) to "educate technical personnel in cyberterrorism response and prevention."


Anonymous used its Twitter account yesterday to announce its intention to post data from the program on the Web, asking its followers if they were "ever interested in anti-cyberterrorism training." Not long after, Anonymous published information on the program.