Lulz Security 'reborn' with military dating site hack

Mar 28, 2012
This file photo shows US soldiers make calls and browsing the Internet in Baquba, north of Baghdad, in 2007. A Lulz Security hacker group that bade farewell to the world last year appeared to make a comeback on Tuesday with a trove of data looted from a dating website for soldiers.

A Lulz Security hacker group that bade farewell to the world last year appeared to make a comeback with a trove of data looted from a dating website for soldiers.

Hackers referring to themselves as "LulzSec Reborn" made a cache of information evidently stolen from MilitarySingles.com website available at online file sharing service Pastebin on Tuesday.

The file included a note saying "laughing at your security since 2011" and a message claiming to have mined personal information from nearly 171,000 accounts at the website.

In a message at an Anonymous News account at on Tuesday, the hackers promised to soon divulge "the full database of military singles" including private messages.

LulzSec, which was associated with loosely knit hacker collective Anonymous, announced in the middle of last year that it was dissolving the group after having caused 50 days of as intended.

The farewell posted online came after suspected members of the group were arrested.

"The original LulzSec gang had its summer of hacktivism brought to a swift end," Graham Cluley said in a Sophos Internet blog post on Tuesday.

"Of course, on the Internet, anyone can claim to be whatever they want and so it's not particularly surprising to see that it was a group calling itself LulzSec Reborn" claiming credit for a hack of MilitarySingles.com.

Cluley said that email address, and even home addresses of "romance-seeking members of the military" were in the trove of information posted on the Internet by the hackers.

"If you know anyone who has ever used the Military Singles website, it would be a good idea to tell them to change their password as a precaution - and to ensure that they are not using the same password anywhere else," Cluely advised.

ESingles Inc., which operates MilitarySingles.com, said it a public statement that it was investigating the hacking claim.

Explore further: Japan court orders Facebook to reveal revenge porn IP addresses

add to favorites email to friend print save as pdf

Related Stories

LulzSec member says group is 'bored'

Jun 26, 2011

A member of a publicity-seeking hacker group that sabotaged websites over the past two months and has announced it is dissolving itself says his group wasn't disbanding under pressure from the FBI or enemy hackers.

Hackers target British anti-crime agency website

Jun 20, 2011

Hackers who have hit the websites of the CIA, US Senate, Sony and others during a month-long rampage claimed on Monday to have knocked the site of Britain's Serious Organized Crime Agency (SOCA) offline.

Hackers claim another Sony attack

Jun 07, 2011

Hackers claimed to have staged another attack on Japanese electronics giant Sony, publishing online a file containing source code for the Sony Computer Entertainment Developer Network.

Hacker group declares cyber war on US police

Aug 07, 2011

A hacker group on Saturday claimed it has "defaced and destroyed" websites at scores of US police agencies in retaliation for the arrest of suspected peers accused of hacking into the CIA, British crime agency SOCA, and ...

Hackers claim stealing SonyPictures.com passwords

Jun 02, 2011

Hackers claimed on Thursday to have stolen more than one million passwords, email addresses and other information from SonyPictures.com in the latest cyberattack on the Japanese electronics giant.

Recommended for you

Kickstarter suspends privacy router campaign

Oct 20, 2014

Kickstarter has suspended an anonymizing router from its crowdfunding site. By Sunday, the page for "anonabox: A Tor hardware router" carried an extra word "(Suspended)" in parentheses with a banner below ...

User comments : 0