Lulzsec

15:42] <heyguise> These hackers decided it would be a good idea to use there status fag powers to gather anons against the infosec industry.
[15:43] <heyguise> It was then some one decided to give monkies machine guns and taught them the weakness of sql tables. Thesemonkies decided they wanted to look good for lulzsec and hacked every possible thing they could, releasing all the information they plundered reguardless to such things as consequence and public realtions.
[15:43] <heyguise> Private data leaked faster then wikileaks brand condom.
[15:43] <heyguise> They continued hacking away hoping to gain a pat on the back from Sabu.
[15:43] <heyguise> Then the summer vacation ended.
[15:44] * Mbradley672|away is now known as Mbradley672
[15:44] <heyguise> They found them selves unable to continue there hackery as more pressing matters became apparent, such as who do i sit with during lunch and whats a cooler elective to take, french or band.
[15:44] <heyguise> Thus ends the saga of #antisec

Lulzsec

Loveboat 

"cyber terrorism group" - Arizona Department of Public Safety


On 8 June 2011, LulzSec hacked into the website of Black & Berg Cybersecurity Consulting, a small network security company, and changed the image displayed on their front page to one containing the LulzSec logo. They did so after the company had issued a "Cybersecurity For The 21st Century, Hacking Challenge", in which they challenged hackers to hack the site and alter the homepage graphic. The intrusion came after Joe Black, an owner of the company posted the message "Black & Berg Cybersecurity Consulting appreciate all the hard work that you're putting in. Your Hacking = Clients for us. Thx" to the LulzSec Twitter account. Though Black & Berg offered a prize of $10,000 and a position with the company for the successful hack, members of LulzSec declined the offer.[59] Instead, the website contained the reply "DONE, THAT WAS EASY. KEEP THE MONEY, WE DO IT FOR THE LULZ".[60]

July 18 - hit News Corporation 

Confusion 


"The Hacker News" picked up a pastebin claiming that OpNoPro is "likely the primary instigator of LulzSec" and listing Heyguise as a member


Barrett Brown was publicly accused of being a member by th3j35t3r and other 

Imperva, a data security company, posted an alleged list of Lulzsec members that listed Brown as the spokesman for the group


Logs: http://pastebin.com/QZXBCBYt


fucked opsec: http://pastebin.com/RBjzDQbS


Guardian piece on anonymous lack of direction (also claims nothing of great value was found) http://www.guardian.co.uk/technology/2011/aug/23/anonymous-lulzsec-problem


DHS Bulletins

http://www.cyberwarnews.info/2011/08/03/dhs-bulletin-released-on-anonymous-activities/

(U) Members of the group LulzSec were possibly associated with the 15 June 2011 DDOS attack on the
Central Intelligence Agencys (CIA) public-facing website. Although no information was stolen or
released to the public, and the website was not defaced, the site was targeted in a manner consistent
with other LulzSec and Anonymous attacks. Anonymous also declared that the group was at war with
the Intelligence Community (IC) and has identified it as a future target. Anonymous is likely targeting
the IC because it views it as violating its core belief in total freedom of information. Additionally,
following the release of government e-mail account data from the July 2011 Booz Allen compromise, an
Anonymous operator stated on Twitter that, We are working on two of the biggest releases for
Anonymous in the last 4 years. Put your helmets on. It is war.


(U) Some members of LulzSec have demonstrated moderately higher levels of skill and creativity that
include using combinations of methods and techniques to target multiple networks. This does not take
into account the possibility of a higher-level actor providing LulzSec or Anonymous more advanced
capabilities. Therefore, it may be advisable to adjust monitoring of both internal and external resources
for indications of a pending or ongoing attack on cyber or telecommunications networks.