LulzSec the time line, history, information links, images videos and haters

TOC

  1. Gallerycontent/images/gallery/lulzsecurity/copy_0_lulzsec-1.jpg
  2. Whowas
  3. Rumors
  4. Haters
  5. Videos
  6. Attack Time Line
  7. official press release's
  8. Links


Who was LulzSec

To put it simple and to write off any false media reports, LulzSec was a group of 6 hackers who used exploits, sqli/sql injection, ddos to bring down targets and leak vital data.These targets ( see below for a list) ranged from X-factor all the way to the CIA, All these big high profile hacks had data releases such as user databases that included address's emails telephone numbers and much more....After a fair few releases they started a Operation called Operation Anti Security, to take down any high profile companies. After 50days LulzSec Released a  statement saying that they have sailed ashore and the Lulzsec team is saying good bye, along with releases of a 400+MB torrent file that contained lots of leaked data.Shortly after the hours of announcing the retirement of LulzSec group, there was reports that they have join Anonymous, A hacktivist group that fights against corruption.By Monday the 26Th of jun 2011, Anonymous announced that it confirms that LulzSec has jumped aboard the Anonymous group and that they are still carrying on withOperation Anti Security. - - - - - -

Rumors

Over the months that LulzSec rampaged the cyber world, they gained  a lot of rumors,These rumors are everything from that they are secert CIA/FBI agents, that they was paid to stir all this trouble up, that they weren't elite hackers and the list goes on.... All these rumors are untrue and false reporting.....With these rumor comes the next sections, the haters dox's and leaks of lulzsec.- - - - - -

Haters dox's and leaks of lulzsec.

Well as mentioned above, they got alot of rumors   as well leaks, doxs and haters.Some of the key players in the hate game towards LulzSec was Jester and TeamPoison along with a small army of  "skids" trying to take down and expose them. From all reports there has not been any confirmation if any of these dox's was ever actually real, i certainly doubt they were.Aswell as the haters they had the fans.These fans grew toover 200k on twitter following and supporting them, I've personally watched a twitter search for lulzsec go off for hours unstopped, and that was weeks ago, its even faster now.Even now after LulzSec has parted as a group, u can see misleading post by high end media reporters, they need to leave it to the ones who understand whats going on, and not just the ones who are assigned a job.....- - - - - -

Videos

Final cut LulzSec video[httpsv://www.youtube.com/watch?v=qPoIXwVVp6Q](<iframe width=)?autoplay=0">50th day Good bye Video.[httpsv://www.youtube.com/watch?v=xJYhPrbtqug](<iframe width=)?autoplay=0">- - - - - -

Time Line as from LulzSecurity.com

We have documented this in case of torrent or paste bin link take downs: all credits go to LulzSecurity.com/releases/. 26/06/11 - 50 Days of Lulz

23/06/11 - Chinga La Migra

17/06/11 - 1000th tweet press release

16/06/11 - 62,000 random logins

13/06/11 - Senate.gov internal data

  • Bethesda internal data press release
  • Bethesda internal data

10/06/11 - Pron.com user database

06/06/11 - Scedev.net source code

  • Sony BMG internal network maps

03/06/11 - Infragard Atlanta users database

  • Karim dox
  • Karim IRC log
  • Karim emails
  • Nintendo.com webserver configuration
  • Unveillance secret conference

02/06/11 - Sownage™ summary

  • Sonypictures.com AutoTrader users database
  • Sonypictures.com Summer of Restless Beauty users database
  • Sonypictures.com Sony Wonder coupons database
  • Sonypictures.com Sony Wonder music codes database
  • Sonypictures.com Seinfeld Del Boca Vista database
  • Sonypictures.com database tables
  • Sonybmg.nl partners & admins database, + layout
  • Sonybmg.be users database

30/05/11 - PBS.org defacement (pbs.org/lulz) snapshot

  • PBS.org defacement (fake Tupac article) snapshot
  • PBS.org internal hosts
  • PBS.org database list
  • PBS.org staffers database
  • PBS.org authors database
  • PBS.org pressroom users database
  • PBS.org stations database
  • PBS.org MySQL users database

23/05/11 - Sonymusic.co.jp database

15/05/11 - UK ATM database

10/05/11 - Fox.com innerworkings

  • Fox.com/sales database
  • Fox.com/sales database cracked passwords

07/05/11 - X Factor contestants database (SQL)


Official Press Release's from Lulzsecurity.com.

We have documented this in case of torrent or paste bin link take downs: all credits go to LulzSec.urity.com/releases/### Sownage 1

Greetings folks. We're LulzSec, and welcome to Sownage. Enclosed you will find various collections of data stolen from internal Sony networks and websites, all of which we accessed easily and without the need for outside support or money. We recently broke into SonyPictures.com and compromised over 1,000,000 users' personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony opt-in data associated with their accounts. Among other things, we also compromised all admin details of Sony Pictures (including passwords) along with 75,000 "music codes" and 3.5 million "music coupons". Due to a lack of resource on our part (The Lulz Boat needs additional funding!) we were unable to fully copy all of this information, however we have samples for you in our files to prove its authenticity. In theory we could have taken every last bit of information, but it would have taken several more weeks. Our goal here is not to come across as master hackers, hence what we're about to reveal: SonyPictures.com was owned by a very simple SQL injection, one of the most primitive and common vulnerabilities, as we should all know by now. From a single injection, we accessed EVERYTHING. Why do you put such faith in a company that allows itself to become open to these simple attacks? What's worse is that every bit of data we took wasn't encrypted. Sony stored over 1,000,000 passwords of its customers in plaintext, which means it's just a matter of taking it. This is disgraceful and insecure: they were asking for it. This is an embarrassment to Sony; the SQLi link is provided in our file contents, and we invite anyone with the balls to check for themselves that what we say is true. You may even want to plunder those 3.5 million coupons while you can. Included in our collection are databases from Sony BMG Belgium & Netherlands. These also contain varied assortments of Sony user and staffer information. Follow our sexy asses on twitter to hear about our upcoming website. Ciao! ^_^### Fuck FBI Friday

Dear Internets, It has come to our unfortunate attention that NATO and our good friend Barrack Osama-Llama 24th-century Obama have recently upped the stakes with regard to hacking. They now treat hacking as an act of war. So, we just hacked an FBI affiliated website (Infragard, specifically the Atlanta chapter) and leaked its user base. We also took complete control over the site and defaced it, check it out if it's still up: https://infragardatlanta.org/ While not very many logins (around 180), we'd like to take the time to point out that all of them are affiliated with the FBI in some way. Most of them reuse their passwords in other places, which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too. One of them, Karim Hijazi, used his Infragard password for his personal gmail, and the gmail of the company he owns. "Unveillance", a whitehat company that specializes in data breaches and botnets, was compromised because of Karim's incompetence. We stole all of his personal emails and his company emails. We also briefly took over, among other things, their servers and their botnet control panel. After doing so, we contacted Karim and told him what we did. After a few discussions, he offered to pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim, a member of an FBI-related website, was willing to give us money and inside info in order to destroy his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information. Naturally we were just stringing him along to further expose the corruption of whitehats. Please find enclosed Karim's full contact details and a log of him talking to us through IRC. Also, enjoy 924 of his internal company emails - we have his personal gmail too, unreleased. We call upon journalists and other writers to delve through the emails carefully, as we have uncovered an operation orchestrated by Unveillance and others to control and assess Libyan cyberspace through malicious means: the U.S. government is funding the CSFI to attack Libya's cyber infrastructure. You will find the emails of all 23 people involved in the emails. Unveillance was also involved in a scheme where they paid an Indian registrar $2000 to receive 100 domains a month that may be deemed as botnet C&Cs. Shameful ploys by supposed "whitehats". We accept your threats, NATO. Game on, losers. Now we are all sons of bitches, Lulz Security### Sownage 2

Konichiwa from LulzSec, Sony bastards! We've recently bought a copy of this great new game called "Hackers vs Sony", but we're unable to play it online due to PSN being obliterated. So we decided to play offline mode for a while and got quite a few trophies. Our latest goal is "Hack Sony 5 Times", so please find enclosed our 5th Sony hack. Enjoy this 54MB collection of SVN Sony Developer source code. That's hackers 16, Sony 0. Your move! ACHIEVEMENT UNLOCKED: HACK SONY 6 TIMES! Oh damn, we just did it again, please also find enclosed internal network maps of Sony BMG. Lulz Security### 1000th tweet statement

Dear Internets, This is Lulz Security, better known as those evil bastards from twitter. We just hit 1000 tweets, and as such we thought it best to have a little chit-chat with our friends (and foes). For the past month and a bit, we've been causing mayhem and chaos throughout the Internet, attacking several targets including PBS, Sony, Fox, porn websites, FBI, CIA, the U.S. government, Sony some more, online gaming servers (by request of callers, not by our own choice), Sony again, and of course our good friend Sony. While we've gained many, many supporters, we do have a mass of enemies, albeit mainly gamers. The main anti-LulzSec argument suggests that we're going to bring down more Internet laws by continuing our public shenanigans, and that our actions are causing clowns with pens to write new rules for you. But what if we just hadn't released anything? What if we were silent? That would mean we would be secretly inside FBI affiliates right now, inside PBS, inside Sony... watching... abusing... Do you think every hacker announces everything they've hacked? We certainly haven't, and we're damn sure others are playing the silent game. Do you feel safe with your Facebook accounts, your Google Mail accounts, your Skype accounts? What makes you think a hacker isn't silently sitting inside all of these right now, sniping out individual people, or perhaps selling them off? You are a peon to these people. A toy. A string of characters with a value. This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn't released something publicly. We're sitting on 200,000 Brink users right now that we never gave out. It might make you feel safe knowing we told you, so that Brink users may change their passwords. What if we hadn't told you? No one would be aware of this theft, and we'd have a fresh 200,000 peons to abuse, completely unaware of a breach. Yes, yes, there's always the argument that releasing everything in full is just as evil, what with accounts being stolen and abused, but welcome to 2011. This is the lulz lizard era, where we do things just because we find it entertaining. Watching someone'sFacebook picture turn into a penis and seeing their sister's shocked response is priceless. Receiving angry emails from the man you just sent 10 dildos to because he can't secure his Amazon password is priceless. You find it funny to watch havoc unfold, and we find it funny to cause it. We release personal data so that equally evil people can entertain us with what they do with it. Most of you reading this love the idea of wrecking someone else's online experience anonymously. It's appealing and unique, there are no two account hijackings that are the same, no two suddenly enraged girlfriends with the same expression when you admit to killing prostitutes from her boyfriend's recently stolen MSN account, and there's certainly no limit to the lulzlizardry that we all partake in on some level. And that's all there is to it, that's what appeals to our Internet generation. We're attracted to fast-changing scenarios, we can't stand repetitiveness, and we want our shot of entertainment or we just go and browse something else, like an unimpressed zombie. Nyan-nyan-nyan-nyan-nyan-nyan-nyan-nyan, anyway... Nobody is truly causing the Internet to slip one way or the other, it's an inevitable outcome for us humans. We find, we nomnomnom, we move onto something else that's yummier. We've been entertaining you 1000 times with 140 characters or less, and we'll continue creating things that are exciting and new until we're brought to justice, which we might well be. But you know, we just don't give a living fuck at this point - you'll forget about us in 3 months' time when there's a new scandal to gawk at, or a new shiny thing to click on via your 2D light-filled rectangle. People who can make things work better within this rectangle have power over others; the whitehats who charge $10,000 for something we could teach you how to do over the course of a weekend, providing you aren't mentally disabled. This is the Internet, where we screw each other over for a jolt of satisfaction. There are peons and lulz lizards; trolls and victims. There's losers that post shit they think matters, and other losers telling them their shit does not matter. In this situation, we are both of these parties, because we're fully aware that every single person that reached this final sentence just wasted a few moments of their time. Thank you, bitches. Lulz Security### 50th day release

Friends around the globe, We are Lulz Security, and this is our final release, as today marks something meaningful to us. 50 days ago, we set sail with our humble ship on an uneasy and brutal ocean: the Internet. The hate machine, the love machine, the machine powered by many machines. We are all part of it, helping it grow, and helping it grow on us. For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could. All to selflessly entertain others - vanity, fame, recognition, all of these things are shadowed by our desire for that which we all love. The raw, uninterrupted, chaotic thrill of entertainment and anarchy. It's what we all crave, even the seemingly lifeless politicians and emotionless, middle-aged self-titled failures. You are not failures. You have not blown away. You can get what you want and you are worth having it, believe in yourself. While we are responsible for everything that The Lulz Boat is, we are not tied to this identity permanently. Behind this jolly visage of rainbows and top hats, we are people. People with a preference for music, a preference for food; we have varying taste in clothes and television, we are just like you. Even Hitler and Osama Bin Laden had these unique variations and style, and isn't that interesting to know? The mediocre painter turned supervillain liked cats more than we did. Again, behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz. We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us. The support we've gathered for it in such a short space of time is truly overwhelming, and not to mention humbling. Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve. So with those last thoughts, it's time to say bon voyage. Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere. Anywhere. Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon. Let it flow... Lulz Security - our crew of six wishes you a happy 2011, and a shout-out to all of our battlefleet members and supporters across the globe ---------- Included in this release: AOL internal data.txt AT&T internal data.rar Battlefield Heroes Beta (550k users).csv FBI being silly.txtHackforums.net (200k users).sqlNato-bookshop.org (12k users).csv Office networks of corporations.txt Private Investigator Emails.txt Random gaming forums (50k users).txt Silly routers.txt navy.mil owned.png- - - - - -

Mind you these links will most likely die out over time. LulzSec Web: https://lulzsecurity.com Twitter: https://twitter.com/#!/LulzSecFacebook: https://www.facebook.com/pages/The-Lulz-Boat-lulzsec/227001363977019 Torrent: https://thepiratebay.org/user/LulzSecYoutube: https://www.youtube.com/results?search_query=LulzSec&aq=f All related videos to LulzSec.Haters @th3j35t3rhttps://th3j35t3r.wordpress.com/@TeaMp0isonhttps://twitter.com/#!/TeaMp0isoN_

Lee Johnstone

Lee Johnstone

Information Security Data Analyst, Investigative Journalist, Technology Lover, Mechanic.

Read More