The hacking group LulzSec (www.lulzsecurity.com) according to the numerous reports has made public the data it gathered from US Senate Server and of game maker Bethesda Softworks (www.bethsoft.com). The report by Computerworld claimed that LulzSec had gathered this data by infiltrating the account of a senator’s office, who has not been named.
“In an attempt to help them fix their issues, we’ve decided to donate additional lulz in the form of owning them some more,” LulzSec writes in a statement. “This is a small, just-for-kicks release of some internal data from Senate.gov – is this an act of war, gentlemen? Problem?”
LulzSec has always been against the US government’s intentions to deem hacking equal to war, and has spoken out numerous times against including the time when it hacked into FBI affiliate InfraGard and posted around 180 passwords and usernames related to numerous cyber security firms. However the server was soon blocked by Senate Staff according to Computerworld therefore LulzSec wasn’t “able to do much on the server”.
“The intruder did not gain access into the Senate computer network and was only able to read and determine the directory structure of the files placed on senate.gov,” Martina Bradford, Senate spokesperson told Computerworld.
The attack made on Bethseda was far worse, the report stated. A total of 200,000 usernames and passwords of players were stolen, however they were not made public.
“After mapping their internal network and thoroughly pillaging all of their servers, we grabbed all their source code and database passwords, which we proceeded to shift silently back to our storage deck,” LulzSec writes in a statement.
“Over the past weekend, a hacker group attempted an unlawful intrusion of our websites to gain access to data,” Bethesda said in a blog post Monday. “We believe we have taken appropriate action to protect our data against these attacks. While no personal financial information or credit card data was obtained, the hackers may have gained access to some user names, email addresses, and/or passwords.”
LulzSec also published some 26,000 log-in passwords of a porn site, pron.com. LulzSec claimed that some of the information stolen belonged to people working for the government and administrators of the porn sites.
Just recently LulzSec was also in the news for stealing the username and passwords of Sony Picture’s users and gained access to a server configuration file belonging to Nintendo server.