LulzSec hackers taunt with telephone hotline

Jun 15, 2011 by Glenn Chapman
A hacker group on Wednesday brazenly ramped up its antics as unrelenting waves of cyberattacks expose how poorly defended many networks are against Internet marauders.

A hacker group on Wednesday brazenly ramped up its antics as unrelenting waves of cyberattacks expose how poorly defended many networks are against Internet marauders.

"It's becoming a big problem, because at the end of the day these guys are doing whatever they want," said Panda computer security labs technical director Luis Corrons. "This is showing us that we have a long way to go to protect our systems and our information."

The public website of the US Central Intelligence Agency (CIA) on Wednesday joined a growing list of hacker targets that has included Sony, The International Monetary Fund, and Citibank.

The CIA told AFP it was looking into reports that was knocked offline temporarily by a hacker group calling itself Lulz Security.

Lulz has claimed in recent weeks to have cracked into Sony, Nintendo, the US Senate, the Public Broadcasting System news organization, and an Infragard company that works with the FBI.

The group is flaunting its notoriety with a telephone hotline for people to call and suggest targets for cyberattacks.

"Our number literally has anywhere between five and 20 people ringing it every single second," members of the group said in a message on their @LulzSec Twitter account.

Setting up a telephone hotline was "kind of eccentric" given that the hackers could have easily created an online forum asking for targets, according to Corrons.

"These guys are upsetting a lot of people," Corrons said. "They think they will never be caught, and that could be their biggest mistake."

Lulz has seized the spotlight amid unrelenting reports of cyberattacks with apparent motivations ranging from spying and profit to glory and activism.

"As we get more connected more of the time, the number of potential attackers is growing because anyone can do it from anywhere in the world," Corrons said. "As the number of potential attackers grows, the number of successful attacks grows."

Hacker group Anonymous, from which Lulz is believed to have formed, gained notoriety with cyberattacks in support of controversial website WikiLeaks.

Unlike cyber criminals who amass armies of "zombie" computers by stealthily infecting machines with viruses, people volunteered to install software in support of Anonymous campaigns, according to Corrons.

"Anonymous has been out there for years," Corrons said, noting the group had launched attacks on music or movie firms taking people to task for pirated songs or films.

"When the WikiLeaks case came, they reacted fast and gained a lot of popularity," he said.

Anonymous used a tried and true distributed-denial-of-service (DDoS) attack that overwhelms websites with simultaneous requests for pages or other bits of content.

At times about 5,000 computers, each firing off about 10 requests per second, took aim at websites for Anonymous, according to Spain-based PandaLabs.

"There are not so many people now as there were a few months ago; I see fewer people connected," Corrons said of Anonymous. "Maybe people are realizing that you can protest, but this is not the best way."

Lulz may be related to Anonymous, but its tactics are more sophisticated.

Lulz cracks computer system defenses instead of simply flooding websites with page requests.

"In the Lulz group, they know what they are doing when it comes to breaking into places," Corrons said.

"It's their way to say the security here sucks and we are going to show you why," he continued. "Based on the way they act, I would say they are young people."

Other attacks reported in recent months, such as those on the IMF, weapons maker Lockheed Martin, and Gmail accounts connected to Chinese activists, bore signs of being the work of spies with political or financial objectives.

"This is showing us that we have a long way to go to protect our systems and our infrastructure," Corrons said. "This is a failure from private companies and even security companies -- there is a lot of room to improve."

Explore further: Meerkat vs. Periscope: Live-streaming app battle & buzz

add to favorites email to friend print save as pdf

Related Stories

Hackers target Bethesda videogame studio

Jun 13, 2011

US videogame studio Bethesda Softworks on Monday said its websites were hit with a cyberattack over the weekend and warned that hackers may have stolen some user data.

Hackers claim another Sony attack

Jun 07, 2011

Hackers claimed to have staged another attack on Japanese electronics giant Sony, publishing online a file containing source code for the Sony Computer Entertainment Developer Network.

Spain nabs 3 suspected of global cyber attacks

Jun 10, 2011

(AP) -- Spanish police arrested three suspected computer hackers who allegedly belonged to a loose-knit international activist group that has attacked corporate and government websites around the world, authorities said ...

Recommended for you

Meerkat vs. Periscope: Live-streaming app battle & buzz

Mar 27, 2015

Download Periscope, Twitter's just-launched live video-streaming app, and you'll find people broadcasting all sorts of mundane stuff: waiting for AT&T to fix their wiring, getting out of bed in Silicon V ...

Twitter chief vows to help Indonesia fight disasters

Mar 26, 2015

Twitter chief Dick Costolo said Thursday the microblogging site planned to work with Indonesian authorities to warn people about natural disasters that regularly hit the archipelago, from earthquakes to volcanic ...

EU unveils ambitious overhaul of digital economy

Mar 25, 2015

The EU unveiled an ambitious plan to overhaul Europe's fragmented digital landscape on Wednesday that would allow Europeans traveling in other bloc countries to get their Netflix film fix or watch BBC iPlayer ...

User comments : 0

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.