[Valid Atom 1.0]

domingo, 26 de junho de 2011

LulzSec claims its 50-day hack spree has expired, but...


After 50 days of attacking several government and corporate websites, the hacker group “Lulz Security" finally declared its hacking spree at an end on Sunday (Manila time).

But LulzSec, in its “final release" posted on Pastebin.com, called for the continuation of Operation AntiSec, to steal and leak classified government information.

“(It’s) time to say bon voyage. Our planned 50-day cruise has expired, and we must now sail into the distance, leaving behind – we hope – inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere," it said.

The group showed no remorse for its deeds in the last 50 days, saying it disrupted and exposed sites to “selflessly entertain others."

It added it had disrupted corporations, governments, often the general population itself, and quite possibly everything in between, “just because we could."

Also, the group left behind a link where users can download a dump of data it had taken from the sites it attacked.

LulzSec had claimed responsibility for hacks on websites of Sony, the US Central Intelligence Agency, the US Senate, and Infragard, a partner of the Federal Bureau of Investigation.

Continue AntiSec

While it announced it was ending operations, LulzSec encouraged the continuation of the AntiSec movement, by joining Anonymous’ IRC (Internet relay chat).

“Finally, we encourage all future #AntiSec enthusiasts to join the AnonOps IRC here: http://t.co/1XLL1Jj and follow @AnonymousIRC for glory!," LulzSec said in another tweet.

AntiSec is a movement seeking to “steal and leak any classified government information, including email spools and documentation," LulzSec had said in a previous post.

“We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we’ve gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don’t stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve," the group said.

No reason to relax

A computer security firm warned against relaxing in the wake of LulzSec’s apparent “demise," saying LulzSec is just one of many hacking groups that are willing to speak out.

“However, LulzSec is just one – particularly vocal – group of hackers. Just because one of the most notorious hacking gangs may have gone the way of the dodo, does not mean you can afford to be complacent about your company’s computer security," Sophos senior technology consultant Graham Cluley said

LulzSec’s apparently sudden decision to quit came shortly after the arrest in the United Kingdom of Ryan Cleary for a series of hack attacks. The group disowned Cleary.

Other hacking groups have also started ganging up on LulzSec, including releasing information on supposedly key members of the gang.

Hacker Th3J35t3r (TheJester) has posted information concerning two suspected Lulz Security members, Sabu and Nakomis.

Another, Warv0x, attacked previous LulzSec victims to show he did not find the attacks being conducted by Lulz Security up to his standards.

On the other hand, another group, TeaMp0isoN vowed to take its followers out one by one, and give it a taste of its own medicine.

“We’re here to show the world that they’re nothing but a bunch of script kiddies," Hex0010, a 23-year-old member of TeaMp0isoN, said in interview on FoxNews.com. — LBG, GMA






LAST

Sphere: Related Content
26/10/2008 free counters

Nenhum comentário: