Archive

Archive for 06/26/2011

Hacking group LulzSec says it’s calling it quits

06/26/2011 Leave a comment

 

After a whirlwind run of headline-grabbing hacking exploits that involved the likes of Sony, the CIA, the U.S. Senate, and FBI partner Infragard, hacking group LulzSec is apparently–and suddenly–calling it quits.

The group, which cropped up on many people’s radar for the first time just last month, sent a tweet late today with a link to a document on Pastebin declaring that the group’s run of cybermischief was coming to an end.

“It’s time to say bon voyage,” the statement reads. “Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind–we hope–inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.” (You can read the complete text of the statement below.)

The group also linked to a final cache of stolen information, which, according to a report in the International Business Times, includes data from AT&T and AOL, among others. Twitter user @Complex posted a link to a screenshot purportedly from the data dump, which shows what looks like a defaced U.S. Navy civilian-careers Web page (see below). LulzSec had said Thursday, after leaking what it called sensitive documents from the Arizona Department of Public Safety, that it would be “releasing more goods” on Monday.

 

A screenshot purportedly from the data dump made today by LulzSec. It shows what appears to be a defaced U.S. Navy civilian-careers Web page.

(Credit: Twitter user @Complex)

 

LulzSec’s apparent disbanding comes just days after a 19-year-old identified as Ryan Cleary was arrested in the U.K. in connection with a series of distributed denial-of-service (DDoS) attacks said to have been the handiwork of the group. LulzSec has denied that Cleary is one of its key associates, though it has acknowledged that he hosts “one of our many legitimate chat rooms on his IRC server.”

The news also follows a public spat between LulzSec and another hacking group, TeaMp0isoN. The two groups claimed to have attacked each other’s servers and threatened to expose rival members. On Wednesday, someone released information purportedly exposing the identity of a key member of LulzSec who goes by the nickname “Sabu.”

And on Friday, British newspaper the Guardian published Internet Relay Chat logs it said were leaked from a private LulzSec chat room. In the logs, Sabu warns others to be careful who they talk to about the group’s activities. “You realize we smacked the FBI today,” Sabu says in the logs. “This means everyone in here must remain extremely secure.”

 

Related links:
With Anonymous and LulzSec, is anyone believable?
Who is behind the hacks? (FAQ)
LulzSec releases Arizona law enforcement data
LulzSec takes down Brazil government sites
LulzSec hackers attack Senate site

 

TeaMp0isoN apparently took a swipe at LulzSec today, after the news of the latter’s demise, tweeting, “see unlike @lulzsec, our movement dosent have an expiry date….we wont ever backdown, this means a lot to us, time for a manifesto.”

In it for the ‘lulz’?
LulzSec first came to notice in May, when it touted its hacking of the Web site for a Fox TV show called “X Factor” and published personal information on the contestants, along with internal Fox data.

The group initially said it was more or less just having a laugh. (Its name conflates the word security with the expression “lol”–which some pronounce as “lull” and which, of course, is the abbreviation for “laugh out loud” that countless Net users and texters have appended to messages to express their appreciation of an especially funny remark.)

And indeed, in the current hacking environment–alongside the exploits of hacktivist groups like Anonymous, which some have seen as absurdly self-important, and the sorts of unknown, and seemingly quite serious, hackers that have breached the networks of U.S. military contractors–LulzSec’s brand of anarchic bravado and brashness may well have inspired a grin or two, or at least a shake of the head. The group hacked a PBS Web site and posted a bogus news story about Tupac Shakur being alive and well and living in New Zealand. And at one point LulzSec even went so far as to set up a request-a-hack hotline.

More recently, however, the group took on a more hacktivist bent, and may have turned up the rhetoric a few too many notches. It formed an alliance with Anonymous in which, it said, the main goal was “to steal and leak any classified government information…Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood.” The first target of this “Operation Anti-Security”–or “AntiSec”–was a U.K. law-enforcement agency dedicated to fighting organized crime. The resulting DDoS attack against the agency is one of the crimes with which Cleary is being charged.

Critics point out that the data LulzSec has released has exposed many to identity theft. And one individual has claimed that the group tried to extort him, though LulzSec claims that the exchanges it had with this person simply led to a misunderstanding. Most recently, and perhaps most seriously, the Arizona Department of Public Safety expressed concern over the safety of its officers following a LulzSec leak of departmental data.

In any case, if today’s statement is to be believed, LulzSec’s hacking days have come to an end. And it’s not entirely clear why. Perhaps, as the purported chat-room remark from Sabu suggests, the group, despite its brashness, was not immune to a case of the nerves.

Last week, the group sent out its 1,000th tweet, which included a link to a manifesto of sorts. In it, LulzSec made it clear that it was aware of the dangers it faced. “We’ve been entertaining you 1000 times with 140 characters or less,” the document reads, “and we’ll continue creating things that are exciting and new until we’re brought to justice, which we might well be.”

It seems, having not yet been nailed (with the exception, perhaps, of Cleary), the group has called things off a bit prematurely–though it remains to be seen if they’ve gotten out of the game soon enough.

The full text of the LulzSec statement follows:

 

Friends around the globe,

We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us.

For the past 50 days we’ve been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others – vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It’s what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself.

While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn’t that interesting to know? The mediocre painter turned supervillain liked cats more than we did.

Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we’ve gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don’t stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve.

So with those last thoughts, it’s time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind – we hope – inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.

Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon.

Let it flow…

Lulz Security – our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe

Read more: http://news.cnet.com/8301-1009_3-20074416-83/hacking-group-lulzsec-says-its-calling-it-quits/#ixzz1QNTw8Hqs

Brazen hacker group LulzSec says it’s disbanding

06/26/2011 Leave a comment
Hacker Adrian Lamo (left) with contemporaries ...

Image via Wikipedia

LulzSec

Brazen hacker group LulzSec says it’s disbanding
NEW YORK – A publicity-seeking hacker group that has left a trail of sabotaged websites over the last two months, including attacks on law enforcement and releases of private data, said unexpectedly on Saturday it is dissolving itself.

Lulz Security made its announcement through its Twitter account. It gave no reason for the disbandment, but it could be a sign of nerves in the face of law enforcement investigations. Rival hackers have also joined in the hunt, releasing information they say could point to the identities of the six-member group.

One of the group’s members was interviewed by The Associated Press on Friday, and gave no indication that its work was ending. LulzSec claimed hacks on major entertainment companies, FBI partner organizations, the CIA, the U.S. Senate and a pornography website.

Kevin Mitnick, a security consultant and former hacker, said the group had probably concluded that the more they kept up their activities, the greater the chance that one of them would make some mistake that would enable authorities to catch them. They’ve inspired copycat groups around the globe, he noted, which means similar attacks are likely to continue even without LulzSec.

“They can sit back and watch the mayhem and not risk being captured,” Mitnick said.

As a parting shot, LulzSec released a grab-bag of documents and login information apparently gleaned from gaming websites and corporate servers. The largest group of documents — 338 files — appears to be internal documents from AT&T Inc., detailing its buildout of a new wireless broadband network in the U.S. The network is set to go live this summer. A spokesman for the phone company could not immediately confirm the authenticity of the documents.

In the Friday interview, the LulzSec member said the group was sitting on at least 5 gigabytes of government and law enforcement data from across the world, which it planned to release in the next three weeks. Saturday’s release was less than a tenth of that size.

In an unusual strategy for a hacker group, LulzSec has sought publicity and conducted a conversation with the public through its Twitter account. Observers believe it’s an offshoot of Anonymous, a larger, more loosely organized group that attempts to mobilize hackers for attacks on targets it considers immoral, like oppressive Middle Eastern governments and opponents of the document-distribution site WikiLeaks. LulzSec, on the other hand, attacked anyone they could for “the lulz,” which is Internet jargon for “laughs.”

mister jester, I got a question for you

06/26/2011 Leave a comment
Topiary work at Parque Francisco Alvarado, Zar...

Image via Wikipedia

Yo mister jester, I got a question for you,
Where’s topiary, nakomis and that fucker sabu?
You talk a big game, Tryin hard to drop all the names,
The only leak you’ve made? That you’re an ignorant butt stain.
Juggle all the balls, why don’t you tell me a joke?
How ’bout that time you tried to sink my boys in the lulzboat?
What’s wrong, bro? You starting to choke?
The masters of the lulz remain afloat.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

You’re like a plague, but only the annoying kind,
Like the one in that movie back in 1999.
You whitehat sucka, god you’re so misled,
I wouldn’t be surprised if you thought we were the Feds.
And antisec? We’re not just the solution,
We’re steps one and two to a global revolution.
Terrorist? Go on, fucka, we the heroes,
Floodin your servers, lotsa ones and zeroes.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

Responden hackers a gobiernos con una canción

06/26/2011 Leave a comment
El Rey, en el ITESM campus Ciudad de México

Image via Wikipedia

Responden hackers a gobiernos con una canción
A través del tema “God Hates Clowns” Lulz Security responde sobre la fallida persecución por identificar y detener a sus integrantes, además de la operación emprendida junto con Anonymous.
Ciudad de MéxicoLa reciente operación Anti Security (AntiSec), lanzada por el grupo de hackers Anonymous y Lulz Security, es uno de los temas que son abordados en “God Hates Clowns”, una canción que se difunde en una red social de músicos.

Bajo el nombre de usuario Anonamelles, el grupo de hacktivistas Anonymous subió desde ayer, en SoundCloud el track en el que se habla además de Lulz Security y la fallida persecución de los gobiernos por identificar a sus integrantes.

“Nosotros somos los reyes de la lulz, los maestros más rápidos del craking… Soy la élite hacker, sus hacks son obsoletos”, es una de las frases de la canción.

En el tema además se minimiza la detención de un joven de 19 años en Reino Unido, que se dijo es presunto miembro de LulzSec y quien daría información sobre la organización.

La acción fue calificada como parte de los “trucos de magia barata” de los gobiernos, quienes son “una mancha de ignorantes” que llevan una máscara.

Sobre la operación que llevan a cabo, el grupo de hackers dice en la canción que sólo son el punto de partida para una revolución global.

“¿Y AntiSec? No somos la solución, somos los pasos uno y dos a una revolución global”.
Hasta el momento, “God Hates Clowns” tiene 14 mil 515 reproducciones y registra 100 descargas.

SoundCloud, ideal para los músicos

La plataforma musical SoundCloud permite a aficionados y músicos alojar hasta cinco canciones al mes en la cuenta free y compartirlas con miembros de esa red social o directamente al mail de alguna persona.

Los usuarios además pueden elegir entre hacer público un track o cobrar por su reproducción.

SoundCloud cuenta además con un servicio de mensajería interno y una galería de aplicaciones. Ofrece también la opción para crear listas de reproducción y que los usuarios puedan dejar comentarios con una marca en el momento exacto durante la reproducción de la canción.

Clave

De acuerdo con Urban Dictionary, lulz es una expresión que en Internet se utiliza para señalar que el contenido es interesante o gracioso.

La canción

Yo mister jester, I got a question for you,
Where’s topiary, nakomis and that fucker sabu?
You talk a big game, Tryin hard to drop all the names,
The only leak you’ve made? That you’re an ignorant butt stain.
Juggle all the balls, why don’t you tell me a joke?
How ’bout that time you tried to sink my boys in the lulzboat?
What’s wrong, bro? You starting to choke?
The masters of the lulz remain afloat.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

You’re like a plague, but only the annoying kind,
Like the one in that movie back in 1999.
You whitehat sucka, god you’re so misled,
I wouldn’t be surprised if you thought we were the Feds.
And antisec? We’re not just the solution,
We’re steps one and two to a global revolution.
Terrorist? Go on, fucka, we the heroes,
Floodin your servers, lotsa ones and zeroes.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

Anuncia Lulz Security el fin de su misión

06/26/2011 Leave a comment
Free twitter badge

Image via Wikipedia

Anuncia Lulz Security el fin de su misión
El grupo hacktivista anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

 

ciudad de mexico • El grupo de hackers Lulz Security anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

“Nuestro crucero planeado 50 días ha expirado, y ahora tenemos que navegar en la distancia, dejando tras de sí – esperamos – la inspiración, aprobación, desaprobación, burla, la vergüenza, la consideración, los celos, el odio, incluso el amor”, indicaron los hactivistas.

La operación Anti Security (AntiSec) “puede continuar sin nosotros… el movimiento se manifiesta en una revolución”, agrega el documento, en el que además exhorta a los cibernautas a continuar la operación porque “juntos, unidos, podemos vencer a nuestros opresores comunes”.

LulzSec atrajo la atención por sus infiltraciones a webs como la de la CIA, FBI, Sony, Fox, Senado de EU, el gobierno de Brasil y la más reciente, la de la policía de Arizona, de la cual extrajeron documentos que hablaban de Joaquín, “El Chapo” Guzmán.

El documento titulado “50 Days of Lulz” finaliza con un agradecimiento a quienes apoyaron al grupo de hackers, además de a sus propios miembros y simpatizantes de Battlefleet.

LulzSec, motivo de inspiración

Apenas, el día de ayer se subió a la plataforma musical SounCloud la canción “God Hates Clowns”, en la que el grupo hacktivista se mofa de los fallidos intentos de los gobiernos por detener los ciberataques y a los propios miembros del grupo.

Tras la noticia del fin de la campaña del grupo de hackers, Anonamelessness, el usuario que cargó “God Hates Clowns” en la red social de músicos, solicita en Twitter alguna propuesta sobre una nueva canción sobre LulzSec.

Con su disolución “mis dos canciones quedaron invalidadas”, publicó en el sitio de microblogging.

Anonamelessness se define como el lado musical de Anonymous e indica en su biografía en Twitter que además apoya a LulzSec y WikiLeaks.

Los archivos

El documento en el que LulzSec envía un mensaje a sus miembros y seguidores, incluye los archivos:

• 50 Days of Lulz.txt
• booty/AOL internal data.txt
• booty/AT&T internal data.rar
• booty/Battlefield Heroes Beta (550k users).csv
• booty/FBI being silly.txt
• booty/Hackforums.net (200k users).sql
• booty/Nato-bookshop.org (12k users).csv
• booty/Office networks of corporations.txt
• booty/Private Investigator Emails.txt
• booty/Random gaming forums (50k users).txt
• booty/Silly routers.txt
• booty/navy.mil owned.png

Balean autobús de pasajeros en Chihuahua

06/26/2011 Leave a comment
Picture 033

Image by kgranju via Flickr

Balean autobús de pasajeros en Chihuahua

El vehículo fue rafagueado después de que un altercado vial entre el chofer y el conductor de una camioneta pick up de color azul.
Chihuahua • La tarde de este sábado un autobús del transporte urbano de la Ruta 3 de pasajeros, fue baleado por desconocidos, luego de un altercado vial entre el chofer del autobús y el conductor de una camioneta pick up de color azul.

Trascendió de manera extraoficial que el autobús de pasajeros circulaba por la Avenida de Las Américas, cuando fue rafagueado de frente por el enojado conductor de la pick up sin producir lesiones al chofer o los pasajeros, sólo daños materiales.

Los pasajeros reaccionaron a la agresión y salieron corriendo del camión, mientras que el sorprendido conductor se tiró al piso y resultó ileso; los responsables se dieron a la fuga con rumbo desconocido

Al lugar acudieron elementos de Seguridad Pública Municipal para levantar el reporte de los hechos y asegurar el área mientras que se levantaba evidencias para la investigación.

Detienen a presunto líder de los “Los Zetas” en Veracruz

06/26/2011 Leave a comment
From a "Wanted" poster. Miguel Trevi...

Image via Wikipedia

Detienen a presunto líder de los “Los Zetas” en Veracruz
Albert González Peña o Franco Bueno Peña, apodado “el Tigre”, realizaba el “cobro de piso” a dueños de bares, centros nocturnos y comerciantes ambulantes en el estado, informó la SSP.
Ciudad de México • La Policía Federal detuvo a Albert González Peña o Franco Bueno Peña, apodado “el Tigre”, presunto jefe de plaza en Veracruz de la organización delictiva “los Zetas”, informó la Secretaría de Seguridad Pública (SSP) federal.

Los hechos ocurrieron en la colonia Las Ánimas, en Veracruz, al cumplimentar una orden de aprehensión, ya que se le relaciona con los delitos de privación ilegal de la libertad, extorsión, narcotráfico y homicidio.

En un comunicado la dependencia señaló que de acuerdo con las investigaciones, este sujeto tenía a su cargo el control del trasiego de droga hacia el norte y centro del país, teniendo como zona de operación el Estado de México y Veracruz.

También realizaba el “cobro de piso” a dueños de bares, centros nocturnos y comerciantes ambulantes en Veracruz, y secuestraba a personas cercanas a él, a quienes privaba de la vida una vez que obtenía el pago que exigía.

El detenido fue puesto a disposición del Fiscal federal para dar cumplimiento a la orden de aprehensión SIEDO/UEIS/36999/2010, relacionada con la causa penal 66/2010, vinculada a las averiguaciones previas PGR/SIEDO/UEIS/185/2010 y PGR/SIEDO/UEIS/389/2010.