Hacker attacks CIA: 'Will continue to act until caught'
Lulz Security's emerging group of hackers challenged "Let's catch us if we can" and insisted on knocking down as many websites as we did with Sony, the US Senate, and the CIA . until we were sacked.
This statement is considered arrogant, but it is also a warning to website owners in preventing Internet risks."You can get expensive, advanced tools . but if you do not regularly update data and increase protection, you will become the latest victim of LulzSec ", David Gorodyansky, CEO of security firm AnchorFree, said.
Lulz Security (LulzSec) claims to hold 62,000 e-mails and passwords of Gmail, Facebook, PayPal, WoW accounts that they collect from various sources. Last week, the group publicly published more than 26,000 sensitive e-mail addresses, used by users to subscribe to a pornographic site. Facebook had to automatically close all social media accounts associated with these e-mails after receiving complaints. For example, a member was hacked by a hacker and impersonated her to say goodbye to a boyfriend.
On Twitter, LulzSec claimed to be "the leader in bringing high quality entertainment".
LulzSec began to be famous after repeatedly attacking Sony's system because Japanese electronics company brought George Hotz to court. They also paralyzed the CIA website for a few hours, posting it on the PBS media site, knocking down the US Senate site . Not only that, but the group was supposed to attack orders. phone even though they claim not to distribute malicious code, only to entertain or alert administrators about vulnerabilities in the system.
LulzSec declared unrelated or confronted with other notorious hacker group, Anonymous. The cyber security community also found that Anonymous had clear criteria and attacked with political motives, while LulzSec made it as random as "children are teasing people" according to Gorodyansky.
The name of this group of hackers also shows that. Security means " security " and Lulz is a variation of LOL (laughs), showing that their attacks are only for entertainment and pleasure.
You should read it
- How to add Gmail to the Windows 10 Mail app
- Transfer mail and contacts to all Gmail accounts
- Story of the 'two-hacker' Sabu: Anonymous traitor, the hero of the FBI
- Configure Window Mail to connect to Gmail
- A simple way to link your Facebook account to Gmail
- How to forward mail (forwarded mail) has received to another mail
- Gmail improvements: Use the E-Mail Client, open multiple accounts
- Yahoo's new mail looks better than you think
May be interested
- White-haired 'monsters'hackers 'white hats' combine a passion for research, discovery and fighting against underground forces that always seek to destroy. in this article, we will return to the original hacker definition and explore the world of white-hat hackers.
- Russian Hacker performs a new attack tacticrussian hacker has stolen personal information in the us, combined with commercial software and social networks to organize destructive attacks on the internet.
- Summary of popular network attacks todayfor attacks by exploiting vulnerabilities, hackers must be aware of security issues on the operating system or software and take advantage of this knowledge to exploit vulnerabilities.
- America found the notorious hacker 'Fxmsp', who was dubbed the 'Invisible God'according to the us department of justice, the real 'fxmsp' hacker is andrey turchin, 37, a kazakh citizen.
- India's largest IT services company is hit by a hacker 'the giant in the field of providing it services in the world's second most populous country, wipro ltd, based in bengaluru, karnataka, india, has become the latest name and also the most lucrative. join the list of businesses that are victims of phishing attacks in 2019.
- The 4 most popular network attacks towards older people in 2018a statistic has shown that in recent years, cyber attacks tend to focus more on older users.
- Hacker was jailed for 2 years for DDoS attacks against Skype and Googlea 21-year-old was jailed for two years after being accused of conducting ddos attacks on high-tech companies such as skype and google.
- Security researcher identified Sharpshooter spy attacks related to the Korean hacker groupthe finding comes through new evidence collected by researchers after analyzing a command and control server (command-and-control server - c2).
- Teen hacker is believed to be behind the notorious hacker group Lapsus$in recent weeks, the lapsus$ hacker group has appeared in the media. security researchers are actively investigating the activities of the lapsus$ hacker group.
- DNS attacks are costing governments worldwide huge amountsgovernment organizations in each country suffer an average of 12 dns attacks per year.