Archive

Posts Tagged ‘Federal Bureau of Investigation’

FBI and Interpol trapped the world’s biggest Butterfly botnet

07/02/2011 Leave a comment

How the FBI and Interpol trapped the world’s biggest Butterfly botnet

The biggest criminal botnet ever identified, with millions of enslaved computers in 172 countries, now has a name of its own – and embedded within the software that created it are the names of its criminal bot masters.

Christian Science Monitor

The world’s biggest criminal botnet, that has enslaved tens of millions of computers across 172 countries, now has a name: “Metulji,” Slovenian for “butterfly.” But even this monster butterfly could get netted.

Earlier this month, the FBI and Interpol conducted “Operation Hive,” which resulted in the arrests of two Metulji operators in Bosnia and Slovenia.

But that may be just the beginning. Despite its mammoth size, the Metulji botnet has an Achilles heel that law enforcement and cyber security experts are exploiting: its criminal creator kept meticulous records of his customers.

RECOMMENDED: Epsilon security breach: 5 signs it’s only the tip of the iceberg

Cheap to build, botnets are a stealthy, anonymous, nearly ideal criminal platform for Internet attacks against company websites. But they are even better at quietly stealing bank logons, passwords, credit card numbers, and social security numbers, says Karim Hijazi, CEO of Unveillance, the Wilmington, Del., botnet tracking company that discovered Metulji.

“We’re already pretty sure this botnet has stolen credentials that resulted in thefts totaling in the millions of dollars,” says Mr. Hijazi. “We still don’t know how many computers are part of this botnet yet. But we expect to have a pretty good idea before long.”

The creator of the sophisticated software kit – who made his money by selling it to those who wanted to build their own botnets – kept careful track of his customers’ criminal nicknames, Mr. Hijazi says. His “Butterfly Bot Kit” was also used to create the infamous Mariposa botnet, another gigantic botnet that at one point in 2009 had 12 million computers in 100 nations under its spell.

Just two years later, Mariposa has been neutralized by law enforcement – in large part by tracking down the purchasers of the software.

“The key here is that during the Mariposa case we discovered the licensing mechanism inside the Butterfly framework,” says Luis Corrons, technical director of Panda Labs, whose company is assisting in the analysis of the new botnet. “These licenses are in the form of bot master nicknames, which are … tied to the sales made to all bot masters who purchased a Butterfly botnet.”

The Metulji botnet was created with a more advanced version of the Butterfly Bot Kit – but it, too, keeps purchase records. Since the Butterfly framework creator was arrested and his computers confiscated, it is “safe to assume” that law enforcement has “very good insight into who is running ANY Butterfly-based botnet out there,” Mr. Corrons writes in an e-mail

Oddly, despite a number of Mariposa-linked arrests last year in Spain and Slovenia, bot masters are still depending on the Butterfly framework to run their Metulji botnets.

“Obviously, those bot masters are either not concerned about going to jail or just plain stupid,” Corrons adds.

Laughing at your security – It’s been a long 50-odd days for the Lulz Boat

06/27/2011 Leave a comment
lulz_476555898Laughing at your security – the Lulz Boat.

 

How the media went along for the Lulz Boat ride

27 June 2011 | 13:02 | @arturodetexas

So, the LulzSec hacker group says it has disbanded – but in less than two months they’ve changed the relationship between hackers and the media.

It’s been a long 50-odd days for the Lulz Boat, those fun-loving hackers sailing under the Twitter handle of LulzSec. If you hadn’t gleaned it by now, the name translates as ‘laughing at your security.’

And that’s what the loose collective has been doing.

We’ve seen LulzSec make a mockery of Sony, the US Senate, CIA and FBI pages, countless security firms (maximum lulz there), PBS (who could forget the fake story reporting on rapper Tupac, alive in New Zealand), lots of gaming companies, and their first prominent target, X Factor contestants who found their application and contact details leaked on the web.

But, of course, so-called ‘grey hat’ hacking/cracking attempts aimed at the disruptive outing of poorly secured systems are not new.

And while they initially claimed they were acting just for the laughs, political leanings came into it later on, as they conceded in an interview with the BBC.

But this ‘hacktivist’ slant was also not new – let’s not forget the Anonymous crowd which LulzSec likely spawned from, which itself received widespread attention when engaging in ‘payback’ Denial of Service attacks on companies which acted against WikiLeaks.

No, new was the way in which this hacking group kept the media waiting on their every breach, joke and, importantly, tweet.

Tweeting out announcements, upcoming targets, jokes and more, LulzSec, has almost 282,000 followers at the time of writing – a figure which has rocketed up in recent weeks.

Even the most popular of the Anonymous Twitter accounts can only muster just over 100,000.

And there’s no doubt the half-dozen hackers who make up LulzSec took real interest in the mainstream media’s coverage of their work, as leaked chat logs confirmed last week.

Yet the more they attacked, the more they talked it up, and the more enemies they made.

A number of these are fellow hackers, who for a range of reasons, have fallen foul of the group.

A few weeks back I spoke to a member of the ‘Backtrace Security’ group referenced in the leaked logs – lead LulzSecer Topiary said they should go after Backtrace because they’d dared to attempt to expose them.

This hacker, formerly associated with Anonymous, was angered at LulzSec’s ‘ignorant vigilante nonsense’, and posted alleged names of the core members online months back. Recent chat logs confirmed the hacker names, but the real ones remain unconfirmed.

‘They think they’re invulnerable…but they’re being really, really sloppy’ he said, after claiming to get hold of the information via social engineering.

‘They are very stupidly overconfident.’
 
He claims the FBI approached him for the names, but in the murky world of chat rooms and stage-names, that can’t be confirmed – the FBI have told several media organisations they can’t comment on such investigations.

What’s not in doubt is the risky game being played – LulzSec have taken a lot of joy from tweeting about all the times they’ve supposedly been exposed, only to remain online.

So far, authorities have arrested people who appear to be loose associates of LulzSec at best, and the likely core members – Topiary, Sabu and Kayla included, keep tweeting.

Now, the group says it’s disbanded – and we’re yet to see someone at the centre of the group charged. (including the arrest of a 19 year-old alleged hacker in England last week)

Will the attacks continue?

I asked Murray Goldschmidt of Australia’s Sense of Security how many companies he worked with had faced attempted breaches.

‘I would say all of them’, he answered. ‘But they don’t necessarily know it’

‘They may have already been attacked but don’t have the ability to respond to it.’

Plenty of these may have been for reasons more spurious than having a laugh. But media organisations should not presume that just because a group of hackers delivers their news right to a journalists’ deskstop via a Twitter feed, that noone else has been at it the whole time.

What’s clear is that the textbook on how to get the media interested – indeed how to string them along – has been rewritten.

Recent attacks on Sega as well as the UK’s Office for National Statistics were denied by the group.  Could someone else be leaking data just for the lulz? Probably.

So watch out for LulzSec Brazil, watch out for LulzSec Italy. Watch out for all sorts of groups who wouldn’t mind some mainstream media notoriety.

Because until someone gets sentenced for some very audacious attacks, you can expect more of the same.

Hacking group LulzSec says it’s calling it quits

06/26/2011 Leave a comment

 

After a whirlwind run of headline-grabbing hacking exploits that involved the likes of Sony, the CIA, the U.S. Senate, and FBI partner Infragard, hacking group LulzSec is apparently–and suddenly–calling it quits.

The group, which cropped up on many people’s radar for the first time just last month, sent a tweet late today with a link to a document on Pastebin declaring that the group’s run of cybermischief was coming to an end.

“It’s time to say bon voyage,” the statement reads. “Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind–we hope–inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.” (You can read the complete text of the statement below.)

The group also linked to a final cache of stolen information, which, according to a report in the International Business Times, includes data from AT&T and AOL, among others. Twitter user @Complex posted a link to a screenshot purportedly from the data dump, which shows what looks like a defaced U.S. Navy civilian-careers Web page (see below). LulzSec had said Thursday, after leaking what it called sensitive documents from the Arizona Department of Public Safety, that it would be “releasing more goods” on Monday.

 

A screenshot purportedly from the data dump made today by LulzSec. It shows what appears to be a defaced U.S. Navy civilian-careers Web page.

(Credit: Twitter user @Complex)

 

LulzSec’s apparent disbanding comes just days after a 19-year-old identified as Ryan Cleary was arrested in the U.K. in connection with a series of distributed denial-of-service (DDoS) attacks said to have been the handiwork of the group. LulzSec has denied that Cleary is one of its key associates, though it has acknowledged that he hosts “one of our many legitimate chat rooms on his IRC server.”

The news also follows a public spat between LulzSec and another hacking group, TeaMp0isoN. The two groups claimed to have attacked each other’s servers and threatened to expose rival members. On Wednesday, someone released information purportedly exposing the identity of a key member of LulzSec who goes by the nickname “Sabu.”

And on Friday, British newspaper the Guardian published Internet Relay Chat logs it said were leaked from a private LulzSec chat room. In the logs, Sabu warns others to be careful who they talk to about the group’s activities. “You realize we smacked the FBI today,” Sabu says in the logs. “This means everyone in here must remain extremely secure.”

 

Related links:
With Anonymous and LulzSec, is anyone believable?
Who is behind the hacks? (FAQ)
LulzSec releases Arizona law enforcement data
LulzSec takes down Brazil government sites
LulzSec hackers attack Senate site

 

TeaMp0isoN apparently took a swipe at LulzSec today, after the news of the latter’s demise, tweeting, “see unlike @lulzsec, our movement dosent have an expiry date….we wont ever backdown, this means a lot to us, time for a manifesto.”

In it for the ‘lulz’?
LulzSec first came to notice in May, when it touted its hacking of the Web site for a Fox TV show called “X Factor” and published personal information on the contestants, along with internal Fox data.

The group initially said it was more or less just having a laugh. (Its name conflates the word security with the expression “lol”–which some pronounce as “lull” and which, of course, is the abbreviation for “laugh out loud” that countless Net users and texters have appended to messages to express their appreciation of an especially funny remark.)

And indeed, in the current hacking environment–alongside the exploits of hacktivist groups like Anonymous, which some have seen as absurdly self-important, and the sorts of unknown, and seemingly quite serious, hackers that have breached the networks of U.S. military contractors–LulzSec’s brand of anarchic bravado and brashness may well have inspired a grin or two, or at least a shake of the head. The group hacked a PBS Web site and posted a bogus news story about Tupac Shakur being alive and well and living in New Zealand. And at one point LulzSec even went so far as to set up a request-a-hack hotline.

More recently, however, the group took on a more hacktivist bent, and may have turned up the rhetoric a few too many notches. It formed an alliance with Anonymous in which, it said, the main goal was “to steal and leak any classified government information…Prime targets are banks and other high-ranking establishments. If they try to censor our progress, we will obliterate the censor with cannonfire anointed with lizard blood.” The first target of this “Operation Anti-Security”–or “AntiSec”–was a U.K. law-enforcement agency dedicated to fighting organized crime. The resulting DDoS attack against the agency is one of the crimes with which Cleary is being charged.

Critics point out that the data LulzSec has released has exposed many to identity theft. And one individual has claimed that the group tried to extort him, though LulzSec claims that the exchanges it had with this person simply led to a misunderstanding. Most recently, and perhaps most seriously, the Arizona Department of Public Safety expressed concern over the safety of its officers following a LulzSec leak of departmental data.

In any case, if today’s statement is to be believed, LulzSec’s hacking days have come to an end. And it’s not entirely clear why. Perhaps, as the purported chat-room remark from Sabu suggests, the group, despite its brashness, was not immune to a case of the nerves.

Last week, the group sent out its 1,000th tweet, which included a link to a manifesto of sorts. In it, LulzSec made it clear that it was aware of the dangers it faced. “We’ve been entertaining you 1000 times with 140 characters or less,” the document reads, “and we’ll continue creating things that are exciting and new until we’re brought to justice, which we might well be.”

It seems, having not yet been nailed (with the exception, perhaps, of Cleary), the group has called things off a bit prematurely–though it remains to be seen if they’ve gotten out of the game soon enough.

The full text of the LulzSec statement follows:

 

Friends around the globe,

We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us.

For the past 50 days we’ve been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others – vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It’s what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself.

While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn’t that interesting to know? The mediocre painter turned supervillain liked cats more than we did.

Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we’ve gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don’t stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve.

So with those last thoughts, it’s time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind – we hope – inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere.

Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon.

Let it flow…

Lulz Security – our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe

Read more: http://news.cnet.com/8301-1009_3-20074416-83/hacking-group-lulzsec-says-its-calling-it-quits/#ixzz1QNTw8Hqs

Anuncia Lulz Security el fin de su misión

06/26/2011 Leave a comment
Free twitter badge

Image via Wikipedia

Anuncia Lulz Security el fin de su misión
El grupo hacktivista anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

 

ciudad de mexico • El grupo de hackers Lulz Security anunció este sábado el fin de una campaña de ataques planeada para 50 días a través de un comunicado que colocó en su página web, junto con 12 archivos en el torrent final.

“Nuestro crucero planeado 50 días ha expirado, y ahora tenemos que navegar en la distancia, dejando tras de sí – esperamos – la inspiración, aprobación, desaprobación, burla, la vergüenza, la consideración, los celos, el odio, incluso el amor”, indicaron los hactivistas.

La operación Anti Security (AntiSec) “puede continuar sin nosotros… el movimiento se manifiesta en una revolución”, agrega el documento, en el que además exhorta a los cibernautas a continuar la operación porque “juntos, unidos, podemos vencer a nuestros opresores comunes”.

LulzSec atrajo la atención por sus infiltraciones a webs como la de la CIA, FBI, Sony, Fox, Senado de EU, el gobierno de Brasil y la más reciente, la de la policía de Arizona, de la cual extrajeron documentos que hablaban de Joaquín, “El Chapo” Guzmán.

El documento titulado “50 Days of Lulz” finaliza con un agradecimiento a quienes apoyaron al grupo de hackers, además de a sus propios miembros y simpatizantes de Battlefleet.

LulzSec, motivo de inspiración

Apenas, el día de ayer se subió a la plataforma musical SounCloud la canción “God Hates Clowns”, en la que el grupo hacktivista se mofa de los fallidos intentos de los gobiernos por detener los ciberataques y a los propios miembros del grupo.

Tras la noticia del fin de la campaña del grupo de hackers, Anonamelessness, el usuario que cargó “God Hates Clowns” en la red social de músicos, solicita en Twitter alguna propuesta sobre una nueva canción sobre LulzSec.

Con su disolución “mis dos canciones quedaron invalidadas”, publicó en el sitio de microblogging.

Anonamelessness se define como el lado musical de Anonymous e indica en su biografía en Twitter que además apoya a LulzSec y WikiLeaks.

Los archivos

El documento en el que LulzSec envía un mensaje a sus miembros y seguidores, incluye los archivos:

• 50 Days of Lulz.txt
• booty/AOL internal data.txt
• booty/AT&T internal data.rar
• booty/Battlefield Heroes Beta (550k users).csv
• booty/FBI being silly.txt
• booty/Hackforums.net (200k users).sql
• booty/Nato-bookshop.org (12k users).csv
• booty/Office networks of corporations.txt
• booty/Private Investigator Emails.txt
• booty/Random gaming forums (50k users).txt
• booty/Silly routers.txt
• booty/navy.mil owned.png

LulzSec claims new international hacking victory

06/22/2011 Leave a comment
London

Image via Wikipedia

LulzSec claims to have brought down two Brazilian government websites in fresh attacks after a 19-year-old teenager from Essex was arrested, accused of being part of the hacker group.

In a tweet in the early hours of Wednesday morning, LulzSecBrazil wrote: “TANGO DOWN brasil.gov.br & presidencia.gov.br”

Another Twitter message from the main LulzSec page then added: “Our Brazilian unit is making progress. Well done @LulzSecBrazil, brothers!”

The websites are the official pages of the Brazilian Government and the President’s office, the equivalent of the Downing Street site.

Attempts to access the websites this morning proved unsuccessful and the attacks appeared to have swamped the pages with internet visits, causing them to crash.

The Brazilian government has become the latest high-profile victim claimed by LulzSec in a list which has allegedly included the CIA, the US Senate, the US television broadcaster PBS, Britain’s Serious and Organised Crime Agency and the technology firms Sony and Nintendo.

If the claims are accurate, it would not be the first time that LulzSec has reacted hard to attempts to damage it.

Yesterday, the group posted the private details, including the home addresses, of one hacker and his associate who “tried to snitch on us”, accusing the hacker of “countless cybercrimes”.

Addressing the post to the “FBI & other law enforcement clowns”, they signed off: “There is no mercy on The Lulz Boat. Snitches get stitches.”

Our Brazilian unit is making progress. Well done @LulzSecBrazil, brothers!less than a minute ago via web Favorite Retweet ReplyThe Lulz Boat
LulzSec

 

The 19-year-old arrested in the UK on Monday night is Ryan Cleary, the son of a college lecturer. The teenager is accused of being a “major player” in LulzSec.

He was held in a raid at his family home in Wickford following a joint investigation between Scotland Yard and the FBI, which was also aimed at finding the hackers who breached security at the video games firms.

No messages were posted on the Twitter account of LulzSec for about 10 hours after the arrest before two denials came.

One read: “Clearly the UK police are so desperate to catch us that they’ve gone and arrested someone who is, at best, mildly associated with us. Lame”

Another read: “Seems the glorious leader of LulzSec got arrested, it’s all over now… wait… we’re all still here! Which poor b—–d did they take down?”

It was alleged last night that Mr Cleary was online in the middle of hacking when he was held. The arrest came hours after an anonymous internet user claiming to be from LulzSec threatened to publish the entire 2011 census database, though this was later dismissed as a hoax. A Scotland Yard spokesman said a “significant amount of material” had been seized from Mr Cleary’s family home by officers from its specialist e-crime unit, and would now be subjected to forensic examination.

Mr Cleary’s family expressed disbelief that the self-confessed computer “nerd” had anything to do with hacking. His mother Rita, 45, said her son “lives his life online” but she thought he had been playing computer games in his bedroom at the detached family home.

She added that, as he was led away by police, he told her he feared he would be extradited to America.

His older brother Mitchell, 22, said: “Ryan is obsessed with computers. That’s all he ever did. I was stunned to hear he had been arrested.

”He’s not the sort of person to do anything mad or go out and let his hair down or do anything violent. He stays in his room – you’ll be lucky if he opens the blinds, but that’s just family, isn’t it? I barely see him – I’m more of a football person – he’s more of an inside person.”

He said his brother had fallen out with people over WikiLeaks: “He used to be part of WikiLeaks and he has upset someone from doing that and they have made a Facebook page having a go at him.”

James Rounce, a neighbour of Cleary, said: “They moved in about 10 years ago and have been pleasant neighbours. I think he had been away at university and had come back for the holidays or because he had finished his exams. You could tell he was very bright just from the way he spoke and presented himself.”

Mr Cleary’s father Neil, 44, worked as musical director on the West End production of the Andrew Lloyd Webber musical Starlight Express. He later became a lecturer at Peterborough Regional College in Cambridgeshire and director of its orchestra. Nick Stamford, a former classmate of Ryan Cleary, said: “He used to spend a lot of time at home and that is when I think he got into computers. He was quite bright but he didn’t really have too many friends.”

LulzSec has emerged in recent weeks as a rival to the hacking group Anonymous, which targeted banks that had refused to process donations to the WikiLeaks website.

The organisation claimed credit for hacking into the accounts of Sony PlayStation users. On Monday it bombarded the website of the Serious and Organised Crime Agency with so much internet traffic it had to be taken offline.

Mr Cleary’s arrest is likely to lead to comparisons with the case of Gary McKinnon, the 45-year-old Briton fighting extradition to the United States, where he could face 60 years in jail if convicted of hacking into Pentagon and Nasa computers.

 

Arrestan en Arizona a supuesto narco serbio; ingresó desde México

06/18/2011 Leave a comment
Official seal of City of Phoenix

Image via Wikipedia

Phoenix– Un ciudadano serbio buscado en Suecia por narcotráfico fue detenido en Estados Unidos, más de un año después de ingresar desde territorio mexicano, informaron las autoridades.

Funcionarios del servicio federal de Inmigración y Control de Aduanas dijeron que Predrag Stojanovic, de 44 años, fue entregado el jueves a la oficina federal de agentes armados, para su extradición.

Se le detuvo el 10 de junio, en Phoenix.

Las autoridades informaron que la corte de distrito de Estocolmo emitió en el 2002 una orden de arresto contra Stojanovic, por narcotráfico agravado que involucró 83 kilogramos (184 libras) de anfetaminas.

Los agentes federales trabajaban con la Fuerza de Tarea sobre Prófugos del FBI en Phoenix cuando encontraron a Stojanovic, quien les dijo que había ingresado ilegalmente desde México en abril del 2010.

La web de la CIA, sin servicio tras un supuesto ciberataque

06/16/2011 Leave a comment
The Escapist (magazine)

Image via Wikipedia

El grupo de ‘hackers’ Lulz Security reclama la autoría del suceso.- Ofrecen un número de teléfono para que los ciudadanos sugieran sitios a atacar.- Anonymous asalta más de 50 webs de Malasia.

El grupo de piratas informáticos Lulz Security ha asegurado, a través de un mensaje en Twitter, que ha atacado en la noche del miércoles la página web de la CIA, que estuvo caída durante unos momentos. Los hackers son los mismos que en el pasado se han atribuido ataques a las páginas del Senado de Estados Unidos, Sony y la televisión pública estadounidense. Un portavoz de la Agencia de Inteligencia ha declarado que estaban estudiando el mensaje de Lulz.

Analistas de seguridad han restado importancia a los ataques de Lulz alegando que el grupo de piratas informáticos están buscando llamar la atención. Lulz no ha colgado en Internet, como si hizo cuando atacó la del Senado, pruebas de tener información relevante proveniente de la página de la CIA.

A pesar de que Lulz Security se presentan más bromistas y activistas que como un grupo con intenciones ilegales, sus miembros han sido acusados de quebrantar la ley y el FBI los está buscando. El grupo, que también ha atacado los sistemas de Nintendo, aseguró en su página de Internet tras atacar la página del Senado que entró en el servidor para poner en evidencia los problemas de seguridad de la red.

Teléfono y Anonymous

La última ocurrencia del grupo, que reivindica sus acciones por sentido del humor ha sido publicar un número de teléfono, cuyo prefijo es del estado de Ohio, para que los ciudadanos escojan sitios que quieren que sean atacados. El número ofrece un buzón de voz para dejar el encargo ya que quienes lo atienden, dos personas con nombre francés, aseguran estar ocupados en sus locuras. Luis Corrons, de Panda Labs, considera que el suministro de un número de teléfono es una propuesta excéntrica porque podrían proponer recibir las sugerencias a través de Internet. No se descarta que la propuesta de un número telefónico tenga el propósito de saturar alguna línea a la manera de una denegación de servicio.

Además de la CIA, Lulzsec es el autor de ataques de denegación de servicio a servidores de sitios de entretenimiento como Eve Online, Minecraft, Legue of Legends y Escapist Magazine. La acción se ha hecho bajo el nombre de #TitanicTakeoverTuesday.

Por otra parte, Anonymous ha atacado esta madrugada más de 50 sitios del Gobierno de Malasia en represalia por haber censurado Wikileaks y sitios de descargas.

Entre las instituciones afectadas están los sitios del Gobierno, el Ministerio de Información, el servicio de bomberos y la autoridad de transporte.