LulzSec member says group is 'bored'

Jun 26, 2011 By PETER SVENSSON and RAPHAEL G. SATTER , Associated Press

A member of a publicity-seeking hacker group that sabotaged websites over the past two months and has announced it is dissolving itself says his group wasn't disbanding under pressure from the FBI or enemy hackers.

"We're not quitting because we're afraid of law enforcement," the LulzSec member said in a conversation with The Associated Press over the Internet voice program Skype. "The press are getting bored of us, and we're getting bored of us."

The group's hacking has included attacks on law enforcement and releases of . It said unexpectedly on Saturday it was dissolving itself.

In the Sunday interview, the hacker acknowledged that some of the material being circulated by rivals online - which purports to reveal the hackers' online nicknames, past histories, and chat logs - was genuine, something he said had proved to be "a distraction."

He added that three or four of Lulz Security's members were taking what he called "a breather" and said he was considering giving up cyberattacks altogether.

"Maybe I'll stop this hacking thing entirely. I haven't decided," he said. He said he couldn't speak for the others' long-term plans, but said it was possible some of the members would continue to be involved with Anonymous, the much larger and more amorphous hacking group which has targeted the Church of Scientology, Middle Eastern dictatorships, and the music industry, among others.

He said the six-member group was still sitting on a considerable amount of stolen law enforcement files.

"It's safe to say at this point that they are sitting on a lot of data."

Although the hacker declined to identify himself publicly, he has verified his membership with Lulz Security by posting a pre-arranged message to the group's popular Twitter feed.

Lulz Security made its Saturday announcement about disbanding through its Twitter account. That statement gave no reason for the disbandment.

One of the group's members was interviewed by The Associated Press on Friday, and gave no indication that its work was ending. LulzSec claimed hacks on major , FBI partner organizations, the CIA, the U.S. Senate and a website.

Kevin Mitnick, a security consultant and former hacker, said the group had probably concluded that the more they kept up their activities, the greater the chance that one of them would make some mistake that would enable authorities to catch them. They've inspired copycat groups around the globe, he noted, which means similar attacks are likely to continue even without LulzSec.

"They can sit back and watch the mayhem and not risk being captured," Mitnick said.

As a parting shot, LulzSec released a grab-bag of documents and login information apparently gleaned from gaming websites and corporate servers. The largest group of documents - 338 files - appears to be internal documents from AT&T Inc., detailing its buildout of a new wireless broadband network in the U.S. The network is set to go live this summer. A spokesman for the phone company could not immediately confirm the authenticity of the documents.

In the Friday interview, the LulzSec member said the group was sitting on at least 5 gigabytes of government and data from across the world, which it planned to release in the next three weeks. Saturday's release was less than a tenth of that size.

In an unusual strategy for a , LulzSec has sought publicity and conducted a conversation with the public through its Twitter account. LulzSec attacked anyone it could for "the lulz," which is Internet jargon for "laughs."

Explore further: Facebook 'newspaper' spells trouble for media

3 /5 (2 votes)
add to favorites email to friend print save as pdf

Related Stories

LulzSec computer hackers release Arizona state files

Jun 24, 2011

Computer hackers who have hit the websites of the CIA, US Senate, Sony and others have released hundreds of documents from the Arizona Department of Public Safety (AZDPS) in their latest cyberattack.

Lulz hackers say attacks are entertainment

Jun 17, 2011

Computer hackers who have hit the websites of the CIA, US Senate, Sony and others during a month-long rampage said Friday that they were staging the attacks for their own entertainment.

Hackers target British anti-crime agency website

Jun 20, 2011

Hackers who have hit the websites of the CIA, US Senate, Sony and others during a month-long rampage claimed on Monday to have knocked the site of Britain's Serious Organized Crime Agency (SOCA) offline.

LulzSec hackers taunt with telephone hotline

Jun 15, 2011

A hacker group on Wednesday brazenly ramped up its antics as unrelenting waves of cyberattacks expose how poorly defended many networks are against Internet marauders.

British teen arrested over CIA, US Senate hacking

Jun 21, 2011

British police working with the FBI arrested a 19-year-old man over attacks by a hacker group on businesses and government agencies including the CIA, US Senate and Sony, Scotland Yard said Tuesday.

Recommended for you

YouTube goes online for second Music Awards

Nov 20, 2014

The YouTube Music Awards are undergoing an overhaul for their second edition next year, scrapping a star-studded gala and instead looking at videos' online buzz.

User comments : 6

Adjust slider to filter visible comments by rank

Display comments: newest first

dirk_bruere
3.4 / 5 (5) Jun 26, 2011
LOL! They're burning their computers and running in the hope that its not too late now they've pissed off big players like the CIA/NSA etc
MRyan
3 / 5 (2) Jun 26, 2011
I am sure that the anger that they have brought down on themselves in the digital world, has nothing to do with this. These kids started out trying to be an entertaining and fun security group. When they realized that they were no good at it, they used pre-structured software. The fun thing is that they do know the media and they did things that was sure to get them media coverage. Yes they got through to Sony, (a company that has not updated their security in a long time), then there was the Senate and CIA and and Arizona Police. All of these were nothing more than front page access. They have not actually done anything of real talent, and now the white hatters are after them.
ziphead
4.1 / 5 (7) Jun 26, 2011
I wish it was that simple, Lulz boys and girls...

Maybe "I don't want to play any more" strategy worked for you in a childcare. This however is a real life.
frajo
not rated yet Jun 27, 2011
Yes they got through to Sony, (a company that has not updated their security in a long time), then there was the Senate and CIA and and Arizona Police. All of these were nothing more than front page access. They have not actually done anything of real talent,
You mean, the front pages they "accessed" were not set up with any real talent?

and now the white hatters are after them.
Shame on the white hatters. They should have been there before them, not after them.
stealthc
3 / 5 (2) Jun 27, 2011
they are dropping out to disassociate themselves from lulzsec and will carry on with the group anonymous now, whatever it is they are announcing is pure bs artist stuff to throw the feds off so that if they get caught, they are caught only for anonymous operations and not for previous lulzsec ops. There are plenty of ways to keep the system from seeing what you are up to, so I am fairly confident that they are safe and that if the government catches anyone, it is a frame job, or fluke job. You really need a fair amount of resources to catch someone on tor.
J-n
1 / 5 (1) Jun 27, 2011
Actually from what it seems the access they got from at least the AZ police was more than just "Front Page Access", as they gained access to training manuals, and Security Breifings, along with other documents.

I would also think that companies who were hacked would be quick to point out that they (lulz) were unable to get a hold of anything beyond the front page.

If these guys were really, actually worried, why the heck would they continue to post ANYTHING? Why not just disappear into the wind, let us all figure out on our own they've disbanded because we see no more attacks?

Shame on the white hatters. They should have been there before them, not after them.


I agree with this wholeheartedly. If the companies/groups that were attacked by lulz and other groups actually CARED about those they serve and work for them they would have done something about their IT security LONG ago.

I can see the IT managers at these locations desperately holding back the "I told you so's"

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.