Archive

Posts Tagged ‘Central Intelligence Agency’

Laughing at your security – It’s been a long 50-odd days for the Lulz Boat

06/27/2011 Leave a comment
lulz_476555898Laughing at your security – the Lulz Boat.

 

How the media went along for the Lulz Boat ride

27 June 2011 | 13:02 | @arturodetexas

So, the LulzSec hacker group says it has disbanded – but in less than two months they’ve changed the relationship between hackers and the media.

It’s been a long 50-odd days for the Lulz Boat, those fun-loving hackers sailing under the Twitter handle of LulzSec. If you hadn’t gleaned it by now, the name translates as ‘laughing at your security.’

And that’s what the loose collective has been doing.

We’ve seen LulzSec make a mockery of Sony, the US Senate, CIA and FBI pages, countless security firms (maximum lulz there), PBS (who could forget the fake story reporting on rapper Tupac, alive in New Zealand), lots of gaming companies, and their first prominent target, X Factor contestants who found their application and contact details leaked on the web.

But, of course, so-called ‘grey hat’ hacking/cracking attempts aimed at the disruptive outing of poorly secured systems are not new.

And while they initially claimed they were acting just for the laughs, political leanings came into it later on, as they conceded in an interview with the BBC.

But this ‘hacktivist’ slant was also not new – let’s not forget the Anonymous crowd which LulzSec likely spawned from, which itself received widespread attention when engaging in ‘payback’ Denial of Service attacks on companies which acted against WikiLeaks.

No, new was the way in which this hacking group kept the media waiting on their every breach, joke and, importantly, tweet.

Tweeting out announcements, upcoming targets, jokes and more, LulzSec, has almost 282,000 followers at the time of writing – a figure which has rocketed up in recent weeks.

Even the most popular of the Anonymous Twitter accounts can only muster just over 100,000.

And there’s no doubt the half-dozen hackers who make up LulzSec took real interest in the mainstream media’s coverage of their work, as leaked chat logs confirmed last week.

Yet the more they attacked, the more they talked it up, and the more enemies they made.

A number of these are fellow hackers, who for a range of reasons, have fallen foul of the group.

A few weeks back I spoke to a member of the ‘Backtrace Security’ group referenced in the leaked logs – lead LulzSecer Topiary said they should go after Backtrace because they’d dared to attempt to expose them.

This hacker, formerly associated with Anonymous, was angered at LulzSec’s ‘ignorant vigilante nonsense’, and posted alleged names of the core members online months back. Recent chat logs confirmed the hacker names, but the real ones remain unconfirmed.

‘They think they’re invulnerable…but they’re being really, really sloppy’ he said, after claiming to get hold of the information via social engineering.

‘They are very stupidly overconfident.’
 
He claims the FBI approached him for the names, but in the murky world of chat rooms and stage-names, that can’t be confirmed – the FBI have told several media organisations they can’t comment on such investigations.

What’s not in doubt is the risky game being played – LulzSec have taken a lot of joy from tweeting about all the times they’ve supposedly been exposed, only to remain online.

So far, authorities have arrested people who appear to be loose associates of LulzSec at best, and the likely core members – Topiary, Sabu and Kayla included, keep tweeting.

Now, the group says it’s disbanded – and we’re yet to see someone at the centre of the group charged. (including the arrest of a 19 year-old alleged hacker in England last week)

Will the attacks continue?

I asked Murray Goldschmidt of Australia’s Sense of Security how many companies he worked with had faced attempted breaches.

‘I would say all of them’, he answered. ‘But they don’t necessarily know it’

‘They may have already been attacked but don’t have the ability to respond to it.’

Plenty of these may have been for reasons more spurious than having a laugh. But media organisations should not presume that just because a group of hackers delivers their news right to a journalists’ deskstop via a Twitter feed, that noone else has been at it the whole time.

What’s clear is that the textbook on how to get the media interested – indeed how to string them along – has been rewritten.

Recent attacks on Sega as well as the UK’s Office for National Statistics were denied by the group.  Could someone else be leaking data just for the lulz? Probably.

So watch out for LulzSec Brazil, watch out for LulzSec Italy. Watch out for all sorts of groups who wouldn’t mind some mainstream media notoriety.

Because until someone gets sentenced for some very audacious attacks, you can expect more of the same.

Brazen hacker group LulzSec says it’s disbanding

06/26/2011 Leave a comment
Hacker Adrian Lamo (left) with contemporaries ...

Image via Wikipedia

LulzSec

Brazen hacker group LulzSec says it’s disbanding
NEW YORK – A publicity-seeking hacker group that has left a trail of sabotaged websites over the last two months, including attacks on law enforcement and releases of private data, said unexpectedly on Saturday it is dissolving itself.

Lulz Security made its announcement through its Twitter account. It gave no reason for the disbandment, but it could be a sign of nerves in the face of law enforcement investigations. Rival hackers have also joined in the hunt, releasing information they say could point to the identities of the six-member group.

One of the group’s members was interviewed by The Associated Press on Friday, and gave no indication that its work was ending. LulzSec claimed hacks on major entertainment companies, FBI partner organizations, the CIA, the U.S. Senate and a pornography website.

Kevin Mitnick, a security consultant and former hacker, said the group had probably concluded that the more they kept up their activities, the greater the chance that one of them would make some mistake that would enable authorities to catch them. They’ve inspired copycat groups around the globe, he noted, which means similar attacks are likely to continue even without LulzSec.

“They can sit back and watch the mayhem and not risk being captured,” Mitnick said.

As a parting shot, LulzSec released a grab-bag of documents and login information apparently gleaned from gaming websites and corporate servers. The largest group of documents — 338 files — appears to be internal documents from AT&T Inc., detailing its buildout of a new wireless broadband network in the U.S. The network is set to go live this summer. A spokesman for the phone company could not immediately confirm the authenticity of the documents.

In the Friday interview, the LulzSec member said the group was sitting on at least 5 gigabytes of government and law enforcement data from across the world, which it planned to release in the next three weeks. Saturday’s release was less than a tenth of that size.

In an unusual strategy for a hacker group, LulzSec has sought publicity and conducted a conversation with the public through its Twitter account. Observers believe it’s an offshoot of Anonymous, a larger, more loosely organized group that attempts to mobilize hackers for attacks on targets it considers immoral, like oppressive Middle Eastern governments and opponents of the document-distribution site WikiLeaks. LulzSec, on the other hand, attacked anyone they could for “the lulz,” which is Internet jargon for “laughs.”

mister jester, I got a question for you

06/26/2011 Leave a comment
Topiary work at Parque Francisco Alvarado, Zar...

Image via Wikipedia

Yo mister jester, I got a question for you,
Where’s topiary, nakomis and that fucker sabu?
You talk a big game, Tryin hard to drop all the names,
The only leak you’ve made? That you’re an ignorant butt stain.
Juggle all the balls, why don’t you tell me a joke?
How ’bout that time you tried to sink my boys in the lulzboat?
What’s wrong, bro? You starting to choke?
The masters of the lulz remain afloat.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

You’re like a plague, but only the annoying kind,
Like the one in that movie back in 1999.
You whitehat sucka, god you’re so misled,
I wouldn’t be surprised if you thought we were the Feds.
And antisec? We’re not just the solution,
We’re steps one and two to a global revolution.
Terrorist? Go on, fucka, we the heroes,
Floodin your servers, lotsa ones and zeroes.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

Responden hackers a gobiernos con una canción

06/26/2011 Leave a comment
El Rey, en el ITESM campus Ciudad de México

Image via Wikipedia

Responden hackers a gobiernos con una canción
A través del tema “God Hates Clowns” Lulz Security responde sobre la fallida persecución por identificar y detener a sus integrantes, además de la operación emprendida junto con Anonymous.
Ciudad de MéxicoLa reciente operación Anti Security (AntiSec), lanzada por el grupo de hackers Anonymous y Lulz Security, es uno de los temas que son abordados en “God Hates Clowns”, una canción que se difunde en una red social de músicos.

Bajo el nombre de usuario Anonamelles, el grupo de hacktivistas Anonymous subió desde ayer, en SoundCloud el track en el que se habla además de Lulz Security y la fallida persecución de los gobiernos por identificar a sus integrantes.

“Nosotros somos los reyes de la lulz, los maestros más rápidos del craking… Soy la élite hacker, sus hacks son obsoletos”, es una de las frases de la canción.

En el tema además se minimiza la detención de un joven de 19 años en Reino Unido, que se dijo es presunto miembro de LulzSec y quien daría información sobre la organización.

La acción fue calificada como parte de los “trucos de magia barata” de los gobiernos, quienes son “una mancha de ignorantes” que llevan una máscara.

Sobre la operación que llevan a cabo, el grupo de hackers dice en la canción que sólo son el punto de partida para una revolución global.

“¿Y AntiSec? No somos la solución, somos los pasos uno y dos a una revolución global”.
Hasta el momento, “God Hates Clowns” tiene 14 mil 515 reproducciones y registra 100 descargas.

SoundCloud, ideal para los músicos

La plataforma musical SoundCloud permite a aficionados y músicos alojar hasta cinco canciones al mes en la cuenta free y compartirlas con miembros de esa red social o directamente al mail de alguna persona.

Los usuarios además pueden elegir entre hacer público un track o cobrar por su reproducción.

SoundCloud cuenta además con un servicio de mensajería interno y una galería de aplicaciones. Ofrece también la opción para crear listas de reproducción y que los usuarios puedan dejar comentarios con una marca en el momento exacto durante la reproducción de la canción.

Clave

De acuerdo con Urban Dictionary, lulz es una expresión que en Internet se utiliza para señalar que el contenido es interesante o gracioso.

La canción

Yo mister jester, I got a question for you,
Where’s topiary, nakomis and that fucker sabu?
You talk a big game, Tryin hard to drop all the names,
The only leak you’ve made? That you’re an ignorant butt stain.
Juggle all the balls, why don’t you tell me a joke?
How ’bout that time you tried to sink my boys in the lulzboat?
What’s wrong, bro? You starting to choke?
The masters of the lulz remain afloat.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

You’re like a plague, but only the annoying kind,
Like the one in that movie back in 1999.
You whitehat sucka, god you’re so misled,
I wouldn’t be surprised if you thought we were the Feds.
And antisec? We’re not just the solution,
We’re steps one and two to a global revolution.
Terrorist? Go on, fucka, we the heroes,
Floodin your servers, lotsa ones and zeroes.

I guess “the jester” fits, your cheap magic tricks,
You wrote apache codes? I upgraded ’em, bitch.
You wear a mask, I wear a fucking top hat,
We ain’t even in the same class, you fatass.
We’re the kings of the lulz, the fast cracking masters,
to all the snitches out there, we leaked your passwords, bastards.
I’m the hacker elite, your hacks are all obsolete,
What’s wrong bro, you freezin’ up? Here, ctrl+alt+del.

Anuncia Lulz Security el fin de su misión

06/26/2011 Leave a comment
Free twitter badge

Image via Wikipedia

Anuncia Lulz Security el fin de su misión
El grupo hacktivista anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

 

ciudad de mexico • El grupo de hackers Lulz Security anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

“Nuestro crucero planeado 50 días ha expirado, y ahora tenemos que navegar en la distancia, dejando tras de sí – esperamos – la inspiración, aprobación, desaprobación, burla, la vergüenza, la consideración, los celos, el odio, incluso el amor”, indicaron los hactivistas.

La operación Anti Security (AntiSec) “puede continuar sin nosotros… el movimiento se manifiesta en una revolución”, agrega el documento, en el que además exhorta a los cibernautas a continuar la operación porque “juntos, unidos, podemos vencer a nuestros opresores comunes”.

LulzSec atrajo la atención por sus infiltraciones a webs como la de la CIA, FBI, Sony, Fox, Senado de EU, el gobierno de Brasil y la más reciente, la de la policía de Arizona, de la cual extrajeron documentos que hablaban de Joaquín, “El Chapo” Guzmán.

El documento titulado “50 Days of Lulz” finaliza con un agradecimiento a quienes apoyaron al grupo de hackers, además de a sus propios miembros y simpatizantes de Battlefleet.

LulzSec, motivo de inspiración

Apenas, el día de ayer se subió a la plataforma musical SounCloud la canción “God Hates Clowns”, en la que el grupo hacktivista se mofa de los fallidos intentos de los gobiernos por detener los ciberataques y a los propios miembros del grupo.

Tras la noticia del fin de la campaña del grupo de hackers, Anonamelessness, el usuario que cargó “God Hates Clowns” en la red social de músicos, solicita en Twitter alguna propuesta sobre una nueva canción sobre LulzSec.

Con su disolución “mis dos canciones quedaron invalidadas”, publicó en el sitio de microblogging.

Anonamelessness se define como el lado musical de Anonymous e indica en su biografía en Twitter que además apoya a LulzSec y WikiLeaks.

Los archivos

El documento en el que LulzSec envía un mensaje a sus miembros y seguidores, incluye los archivos:

• 50 Days of Lulz.txt
• booty/AOL internal data.txt
• booty/AT&T internal data.rar
• booty/Battlefield Heroes Beta (550k users).csv
• booty/FBI being silly.txt
• booty/Hackforums.net (200k users).sql
• booty/Nato-bookshop.org (12k users).csv
• booty/Office networks of corporations.txt
• booty/Private Investigator Emails.txt
• booty/Random gaming forums (50k users).txt
• booty/Silly routers.txt
• booty/navy.mil owned.png

LulzSec: the members and the enemies

06/25/2011 Leave a comment
Logo of PyPy

Image via Wikipedia

LulzSec: the members and the enemies

While Sabu and Topiary are firmly on the inside, the likes of The Jester and LulzSec Exposed are most certainly not

 

Inside

Sabu Apparent founder and leader of LulzSec, he is a long-time hacktivist associated with senior Anonymous members. Decides who can join the group and who should be targeted. Attempts by rivals to uncover details about his real-life identity suggest he is a 30-year-old IT consultant skilled in the Python programming language who has lived in New York. The timing of some his tweets – tweeting “goodnight all” at 0700 BST, or 0200 New York time – implies he is on the US’s eastern seaboard.

 

Topiary Believed to be second-in-command, and the public face of LulzSec. An eloquent writer with a sharp turn of phrase, Topiary manages the main LulzSec Twitter account and has a hand in most of the group’s rare public pronouncements. Well-known among hackers due to long links with senior Anonymous members. Chat logs taken over five days from May and June show Topiary to be oddly self-conscious – he said of a Wikipedia page about himself: “can we delete it somehow?” – and not beyond his own reproach: “Sabu and I got a bit carried away and gave LulzSec away a bit.” Little is known about his identity, though he has been informally addressed as Daniel in leaked transcripts.

 

Kayla Thought to be the only senior female member of the hacking community, with lengthy involvement in the top command of Anonymous and, latterly, LulzSec. Apparently owns a powerful botnet used to take down targets. May have been instrumental in the attack in February on a US security firm, HBGary. In logs, referred to as LulzSec’s “assassin/spy”.

 

Storm Another senior hacker apparently controlling a large botnet of infected computers. Known for targeting rival hacker forums, and acting on Sabu’s instruction. Appears to be a veteran in the world of taking down websites, privately disclosing this month in logs seen by the Guardian that his denial of service tool is “over 10 years old”.

Joepie92/Joepie91

Fringe member who spends much of the time “idling” in the group’s chatrooms rather than actively co-ordinating or supporting attacks. Helps identify rival hackers. Little is known about his real-life identity.

 

 

Neuron One of the most technically able members of LulzSec, Neuron builds tools for the group and is occasionally involved in distributed denial of service (DDoS) attacks. Little is known about Neuron’s real-life identity, although his use of “aye” for “yes” suggests he is in or from the UK.

 

Tflow Credited with creating LulzSec’s famous Friday song, a comical skit denouncing other hackers and warning its rivals. Tflow also appears to be involved in maintenance for the main LulzSec website, protecting it from incoming attacks. Claims to have been around since the start of LulzSec towards the end of May.

Outside

The Jester Emphatically not a member of LulzSec. A lone-wolf hacker, self-described as a “hacktivist for good”. Believed to be ex-military, The Jester appears to have considerable firepower, which he principally employs against jihadist websites. A thorn in the side of the sprawling collectives Anonymous and, latterly, LulzSec for some time: publicly mocking their “childish” pursuits and threatening to expose key members by releasing their “Dox”: documents and information that would identify them in real life. Most believe the Jester to be based in the US, a product of his military background. He also attacks what he calls “terrorists, sympathizers, fixers, facilitators, and other general bad guys”. Brought down the WikiLeaks website in November, hours before it released the US diplomatic cables, with an enormous DDOS attack.

 

LulzSec Exposed Group of unknown size of self-described “web ninjas” who say they are unaffiliated to The Jester, but share his desire to out members of LulzSec. Claim to be angry on behalf of victims; English may not be their first language (or perhaps not that of the person(s) writing their blog. “We are not doing this for [the] sake of publicity or media attention,” they say on their blog. “We just thought we could help and we did it.”

LulzSec claims new international hacking victory

06/22/2011 Leave a comment
London

Image via Wikipedia

LulzSec claims to have brought down two Brazilian government websites in fresh attacks after a 19-year-old teenager from Essex was arrested, accused of being part of the hacker group.

In a tweet in the early hours of Wednesday morning, LulzSecBrazil wrote: “TANGO DOWN brasil.gov.br & presidencia.gov.br”

Another Twitter message from the main LulzSec page then added: “Our Brazilian unit is making progress. Well done @LulzSecBrazil, brothers!”

The websites are the official pages of the Brazilian Government and the President’s office, the equivalent of the Downing Street site.

Attempts to access the websites this morning proved unsuccessful and the attacks appeared to have swamped the pages with internet visits, causing them to crash.

The Brazilian government has become the latest high-profile victim claimed by LulzSec in a list which has allegedly included the CIA, the US Senate, the US television broadcaster PBS, Britain’s Serious and Organised Crime Agency and the technology firms Sony and Nintendo.

If the claims are accurate, it would not be the first time that LulzSec has reacted hard to attempts to damage it.

Yesterday, the group posted the private details, including the home addresses, of one hacker and his associate who “tried to snitch on us”, accusing the hacker of “countless cybercrimes”.

Addressing the post to the “FBI & other law enforcement clowns”, they signed off: “There is no mercy on The Lulz Boat. Snitches get stitches.”

Our Brazilian unit is making progress. Well done @LulzSecBrazil, brothers!less than a minute ago via web Favorite Retweet ReplyThe Lulz Boat
LulzSec

 

The 19-year-old arrested in the UK on Monday night is Ryan Cleary, the son of a college lecturer. The teenager is accused of being a “major player” in LulzSec.

He was held in a raid at his family home in Wickford following a joint investigation between Scotland Yard and the FBI, which was also aimed at finding the hackers who breached security at the video games firms.

No messages were posted on the Twitter account of LulzSec for about 10 hours after the arrest before two denials came.

One read: “Clearly the UK police are so desperate to catch us that they’ve gone and arrested someone who is, at best, mildly associated with us. Lame”

Another read: “Seems the glorious leader of LulzSec got arrested, it’s all over now… wait… we’re all still here! Which poor b—–d did they take down?”

It was alleged last night that Mr Cleary was online in the middle of hacking when he was held. The arrest came hours after an anonymous internet user claiming to be from LulzSec threatened to publish the entire 2011 census database, though this was later dismissed as a hoax. A Scotland Yard spokesman said a “significant amount of material” had been seized from Mr Cleary’s family home by officers from its specialist e-crime unit, and would now be subjected to forensic examination.

Mr Cleary’s family expressed disbelief that the self-confessed computer “nerd” had anything to do with hacking. His mother Rita, 45, said her son “lives his life online” but she thought he had been playing computer games in his bedroom at the detached family home.

She added that, as he was led away by police, he told her he feared he would be extradited to America.

His older brother Mitchell, 22, said: “Ryan is obsessed with computers. That’s all he ever did. I was stunned to hear he had been arrested.

”He’s not the sort of person to do anything mad or go out and let his hair down or do anything violent. He stays in his room – you’ll be lucky if he opens the blinds, but that’s just family, isn’t it? I barely see him – I’m more of a football person – he’s more of an inside person.”

He said his brother had fallen out with people over WikiLeaks: “He used to be part of WikiLeaks and he has upset someone from doing that and they have made a Facebook page having a go at him.”

James Rounce, a neighbour of Cleary, said: “They moved in about 10 years ago and have been pleasant neighbours. I think he had been away at university and had come back for the holidays or because he had finished his exams. You could tell he was very bright just from the way he spoke and presented himself.”

Mr Cleary’s father Neil, 44, worked as musical director on the West End production of the Andrew Lloyd Webber musical Starlight Express. He later became a lecturer at Peterborough Regional College in Cambridgeshire and director of its orchestra. Nick Stamford, a former classmate of Ryan Cleary, said: “He used to spend a lot of time at home and that is when I think he got into computers. He was quite bright but he didn’t really have too many friends.”

LulzSec has emerged in recent weeks as a rival to the hacking group Anonymous, which targeted banks that had refused to process donations to the WikiLeaks website.

The organisation claimed credit for hacking into the accounts of Sony PlayStation users. On Monday it bombarded the website of the Serious and Organised Crime Agency with so much internet traffic it had to be taken offline.

Mr Cleary’s arrest is likely to lead to comparisons with the case of Gary McKinnon, the 45-year-old Briton fighting extradition to the United States, where he could face 60 years in jail if convicted of hacking into Pentagon and Nasa computers.

 

La web de la CIA, sin servicio tras un supuesto ciberataque

06/16/2011 Leave a comment
The Escapist (magazine)

Image via Wikipedia

El grupo de ‘hackers’ Lulz Security reclama la autoría del suceso.- Ofrecen un número de teléfono para que los ciudadanos sugieran sitios a atacar.- Anonymous asalta más de 50 webs de Malasia.

El grupo de piratas informáticos Lulz Security ha asegurado, a través de un mensaje en Twitter, que ha atacado en la noche del miércoles la página web de la CIA, que estuvo caída durante unos momentos. Los hackers son los mismos que en el pasado se han atribuido ataques a las páginas del Senado de Estados Unidos, Sony y la televisión pública estadounidense. Un portavoz de la Agencia de Inteligencia ha declarado que estaban estudiando el mensaje de Lulz.

Analistas de seguridad han restado importancia a los ataques de Lulz alegando que el grupo de piratas informáticos están buscando llamar la atención. Lulz no ha colgado en Internet, como si hizo cuando atacó la del Senado, pruebas de tener información relevante proveniente de la página de la CIA.

A pesar de que Lulz Security se presentan más bromistas y activistas que como un grupo con intenciones ilegales, sus miembros han sido acusados de quebrantar la ley y el FBI los está buscando. El grupo, que también ha atacado los sistemas de Nintendo, aseguró en su página de Internet tras atacar la página del Senado que entró en el servidor para poner en evidencia los problemas de seguridad de la red.

Teléfono y Anonymous

La última ocurrencia del grupo, que reivindica sus acciones por sentido del humor ha sido publicar un número de teléfono, cuyo prefijo es del estado de Ohio, para que los ciudadanos escojan sitios que quieren que sean atacados. El número ofrece un buzón de voz para dejar el encargo ya que quienes lo atienden, dos personas con nombre francés, aseguran estar ocupados en sus locuras. Luis Corrons, de Panda Labs, considera que el suministro de un número de teléfono es una propuesta excéntrica porque podrían proponer recibir las sugerencias a través de Internet. No se descarta que la propuesta de un número telefónico tenga el propósito de saturar alguna línea a la manera de una denegación de servicio.

Además de la CIA, Lulzsec es el autor de ataques de denegación de servicio a servidores de sitios de entretenimiento como Eve Online, Minecraft, Legue of Legends y Escapist Magazine. La acción se ha hecho bajo el nombre de #TitanicTakeoverTuesday.

Por otra parte, Anonymous ha atacado esta madrugada más de 50 sitios del Gobierno de Malasia en represalia por haber censurado Wikileaks y sitios de descargas.

Entre las instituciones afectadas están los sitios del Gobierno, el Ministerio de Información, el servicio de bomberos y la autoridad de transporte.