moments ago that it hacked the Atlanta chapter of Infragard, an FBI affiliate
, and uploaded the company's user database to the Internet. The cracking group also claims that documents yielded by the intrusion expose an associated company's use of botnets (networks of malware-infected personal computers) and an attempt by someone involved with it to pay LulzSec not to expose the breach.
We just hacked an FBI affiliated website (Infragard, specifically the Atlanta chapter) and leaked its user base. We also took complete control over the site and defaced it, check it out if it's still up: http://infragardatlanta.org/
While not very many logins (around 180), we'd like to take the time to point out that all of them are affiliated with the FBI in some way. Most of them reuse their passwords in other places, which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too.
One of them, Karim Hijazi, used his Infragard password for his personal gmail, and the gmail of the company he owns. "Unveillance", a whitehat company that specializes in data breaches and botnets, was compromised because of Karim's incompetence. We stole all of his personal emails and his company emails. We also briefly took over, among other things, their servers and their botnet control panel.
After doing so, we contacted Karim and told him what we did. After a few discussions, he offered to pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim, a member of an FBI-related website, was willing to give us money and inside info in order to destroy his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information.
Lulzsec recently defaced PBS's website and stole more than 1m user records and coupon codes at Sony Pictures Entertainment's.
The data posted online includes the personal info for 180 users at Infragard, which is a private-public partnership between the FBI and U.S. businesses "designed to protect IT systems from hacker attacks and other intrusions."
It also includes purported chatlogs with Hijazi; and more than 700MB of internal emails discussing the operations of his company, which include references to network surveillance of Libyan interests.
Though encrypted, the Infragard passwords were also cracked. Of their wide reuse for personal email and other online services, LulzSec adds: "they should be considered imbeciles from this moment until their moment of death."
For the curious, the YouTube video used to deface Infragard's website features someone LulzSec has argued with on Twitter, being insulted by an interviewer.
: Karim Hijazi, the CEO of Unveillance, responding to LulzSec's claims
Over the last two weeks, my company, Unveillance, has been the target of a sophisticated group of hackers now identified as "LulzSec." During this two week period, I was personally contacted by several members of this group who made threats against me and my company to try to obtain money as well as to force me into revealing sensitive data about my botnet intelligence that would have put many other businesses, government agencies and individuals at risk of massive Distributed Denial of Service (DDoS) attacks.
In spite of these threats, I refused to pay off LulzSec or to supply them with access to this sensitive botnet information. Had we agreed to provide this data to them, LulzSec would have been able to grow the size and scope of their DDoS attack and fraud capabilities.
: And here's LulzSec with another response
Karim compromised his entire company and the personal lives of his colleagues, then attempted to silence us with promises of financial gain and mutual benefits ... [he] used the same password for all of his online accounts and all accounts linked to a company he owns. Then he tried to bargain with hackers so his company wouldn't crumble.
LulzSec versus FBI Affiliates + Whitehats
At Vice, Leigh Alexander (recently at Boing Boing) writes about the superstitious rituals we all practice when it comes to technology. We do it whether we are conscious of the ritual or not, and we do it even when we are informed the ritual is harmful to the machines. …blowing on cartridges may have actually […]
Human biases exposed by Implicit Association Tests can be replicated in machine learning using GloVe word embedding, according to a new study where GloVe was trained on “a corpus of text from the Web.”
Hey, it’s your ol’ pal Joel! Used to write a gadget blog that wasn’t about gadgets? Man, great to see you. No, no, have a seat. Can we get a couple of…yeah, no ice, thanks.So let’s get business out of the way before we eat: One of my clients is launching a Kickstarter today and […]
If you own a dog, you’ve most likely heard of BarkBox – the monthly subscription box for dogs. What started as a simple idea to try out the subscription model on pet owners has since developed a cult following of dog lovers. If you haven’t given it a try yet, this one month free deal is the […]
With the iPhone headphone jack having gone by the wayside, we’re excited about the addition of the FRANKLIN Bluetooth Headphones in our store. These headphones are foldable so they’re easy to carry around, but most importantly, they pack impressive sound. Our biggest struggle with Bluetooth headphones is the worry of them dying at the worst moment. This pair lasts an impressive 8-10 […]
Evan Kimbrell, founder of the digital agency Sprintkick, recently released a series of online courses that feature some of the best advice we’ve come across. These courses are well worth your time, and will save you from making many typical mistakes down the line if you ever want to start your own business.With this Business […]