reghakr
Essential Member
- Joined
- Jan 26, 2009
- Messages
- 14,186
- Thread Author
- #1
While Sony may have gotten its Playstation Network back online this week, other divisions of the Japanese business are still feeling hack attacks. The web site Naked Security reports that a hacker found his way into a data base at Sony Europe and took out "120 usernames, passwords (plain text), mobile phone numbers, work emails and website addresses." The story claims that the hacker is named "Idahc" from Lebanon and also claims that he "used standard SQL injection techniques" in order to find his way to Sony Europe's data base. He apparently also hacked his way back in May 2011 into the Canadian Sony Ericsson web site.
Meanwhile, PC Magazine reports that Sony has admitted that the hacker group known as "Lulzsec" are indeed the ones who got into the SonyPictures.com web site on Thursday. The group boldly announced that they had obtained personal info from over 1 million people from the site. Sony Pictures said on Friday in a statement that it had "retained a respected team of experts to conduct the forensic analysis of the attack, which is ongoing."
Lulzsec is not only going after Sony. The group announced on Friday that it had hacked into and defaced the web site of the Atlanta division of Infragard. The site is affiliated with the FBI (in what way is not known) and Lulzsec said in a statement that it had obtained over 180 logins from the site. The group said it targeted the site because the US government had recently announced that cyber attacks on the country might be considered an act of war.
Source: Neowin.net - More Sony hack attacks; LulzSec goes after FBI affiliated site
Meanwhile, PC Magazine reports that Sony has admitted that the hacker group known as "Lulzsec" are indeed the ones who got into the SonyPictures.com web site on Thursday. The group boldly announced that they had obtained personal info from over 1 million people from the site. Sony Pictures said on Friday in a statement that it had "retained a respected team of experts to conduct the forensic analysis of the attack, which is ongoing."
Lulzsec is not only going after Sony. The group announced on Friday that it had hacked into and defaced the web site of the Atlanta division of Infragard. The site is affiliated with the FBI (in what way is not known) and Lulzsec said in a statement that it had obtained over 180 logins from the site. The group said it targeted the site because the US government had recently announced that cyber attacks on the country might be considered an act of war.
Source: Neowin.net - More Sony hack attacks; LulzSec goes after FBI affiliated site
reghakr
Essential Member
- Joined
- Jan 26, 2009
- Messages
- 14,186
- Thread Author
- #2
1.LulzSec versus FBI (we challenge you, NATO!)
2.
3.Donate BitCoins for more lulz: 176LRX4WRWD5LWDMbhr94ptb2MW9varCZP
4.
5. ## DOWNLOAD LINKS LOCATED AT THE BOTTOM ##
6.
7.
8.
9.. /$$ /$$ /$$$$$$
10..| $$ | $$ /$$__ $$
11..| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$
12..| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
13..| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$
14..| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$
15..| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
16..|________/ \______/ |__/|________/ \______/ \_______/ \_______/
17. //Laughing at your security since 2011!
18.
19..-- .-""-.
20.. ) ( )
21.. ( ) (
22.. / )
23.. (_ _) 0_,-.__
24.. (_ )_ |_.-._/
25.. ( ) |lulz..\
26.. (__) |__--_/
27.. |'' ``\ |
28.. | [Lulz] \ | /b/
29.. | \ ,,,---===?A`\ | ,==y'
30.. ___,,,,,---==""\ |M] \ | ;|\ |>
31.. _ _ \ ___,|H,,---==""""bno,
32.. o O (_) (_) \ / _ AWAW/
33.. / _(+)_ dMM/
34.. \@_,,,,,,---==" \ \\|// MW/
35..--''''" === d/
36.. // SET SAIL FOR FAIL!
37.. ,'_________________________
38.. \ \ \ \ ,/~~~~~~~~~~~~~~~~~~~~~~~~~~~
39.. _____ ,' ~~~ .-""-.~~~~~~ .-""-.
40.. .-""-. ///==--- /`-._ ..-' -.__..-'
41.. `-.__..-' =====\\\\\\ V/ .---\.
42.. ~~~~~~~~~~~~, _',--/_.\ .-""-.
43.. .-""-.___` -- \| -.__..-
44.
45.
46.Dear Internets,
47.
48.It has come to our unfortunate attention that NATO and our good friend Barrack
49.Osama-Llama 24th-century Obama have recently upped the stakes with regard to hacking.
50.They now treat hacking as an act of war. So, we just hacked an FBI affiliated website
51.(Infragard, specifically the Atlanta chapter) and leaked its user base. We also took
52.complete control over the site and defaced it, check it out if it's still up: Under construction
53.
54.While not very many logins (around 180), we'd like to take the time to point out that all
55.of them are affiliated with the FBI in some way. Most of them reuse their passwords in other places,
56.which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too.
57.
58.One of them, Karim Hijazi, used his Infragard password for his personal gmail, and the gmail of
59.the company he owns. "Unveillance", a whitehat company that specializes in data breaches and botnets,
60.was compromised because of Karim's incompetence. We stole all of his personal emails and his company
61.emails. We also briefly took over, among other things, their servers and their botnet control panel.
62.
63.After doing so, we contacted Karim and told him what we did. After a few discussions, he offered to
64.pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim,
65.a member of an FBI-related website, was willing to give us money and inside info in order to destroy
66.his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information.
67.
68.Naturally we were just stringing him along to further expose the corruption of whitehats.
69.Please find enclosed Karim's full contact details and a log of him talking to us through IRC.
70.Also, enjoy 924 of his internal company emails - we have his personal gmail too, unreleased.
71.
72.We call upon journalists and other writers to delve through the emails carefully, as we have
73.uncovered an operation orchestrated by Unveillance and others to control and assess Libyan
74.cyberspace through malicious means: the U.S. government is funding the CSFI to attack Libya's
75.cyber infrastructure. You will find the emails of all 23 people involved in the emails.
76.
77.Unveillance was also involved in a scheme where they paid an Indian registrar $2000 to
78.receive 100 domains a month that may be deemed as botnet C&Cs. Shameful ploys by supposed "whitehats".
79.
80.We accept your threats, NATO. Game on, losers.
81.
82.Now we are all sons of bitches,
83.
84.Lulz Security
85.
86.
87.
88.## YOU HAVE SKIPPED OR READ THE PRETENTIOUS BORING MESSAGE AND ARE NOW ACQUIRING LULZ ##
89.
90.FBI logins/Karim chatlog/information: Link Removed due to 404 Error
91.Karim's emails (700MB): Link Removed - Invalid URL
Source: Link Removed
2.
3.Donate BitCoins for more lulz: 176LRX4WRWD5LWDMbhr94ptb2MW9varCZP
4.
5. ## DOWNLOAD LINKS LOCATED AT THE BOTTOM ##
6.
7.
8.
9.. /$$ /$$ /$$$$$$
10..| $$ | $$ /$$__ $$
11..| $$ /$$ /$$| $$ /$$$$$$$$| $$ \__/ /$$$$$$ /$$$$$$$
12..| $$ | $$ | $$| $$|____ /$$/| $$$$$$ /$$__ $$ /$$_____/
13..| $$ | $$ | $$| $$ /$$$$/ \____ $$| $$$$$$$$| $$
14..| $$ | $$ | $$| $$ /$$__/ /$$ \ $$| $$_____/| $$
15..| $$$$$$$$| $$$$$$/| $$ /$$$$$$$$| $$$$$$/| $$$$$$$| $$$$$$.$
16..|________/ \______/ |__/|________/ \______/ \_______/ \_______/
17. //Laughing at your security since 2011!
18.
19..-- .-""-.
20.. ) ( )
21.. ( ) (
22.. / )
23.. (_ _) 0_,-.__
24.. (_ )_ |_.-._/
25.. ( ) |lulz..\
26.. (__) |__--_/
27.. |'' ``\ |
28.. | [Lulz] \ | /b/
29.. | \ ,,,---===?A`\ | ,==y'
30.. ___,,,,,---==""\ |M] \ | ;|\ |>
31.. _ _ \ ___,|H,,---==""""bno,
32.. o O (_) (_) \ / _ AWAW/
33.. / _(+)_ dMM/
34.. \@_,,,,,,---==" \ \\|// MW/
35..--''''" === d/
36.. // SET SAIL FOR FAIL!
37.. ,'_________________________
38.. \ \ \ \ ,/~~~~~~~~~~~~~~~~~~~~~~~~~~~
39.. _____ ,' ~~~ .-""-.~~~~~~ .-""-.
40.. .-""-. ///==--- /`-._ ..-' -.__..-'
41.. `-.__..-' =====\\\\\\ V/ .---\.
42.. ~~~~~~~~~~~~, _',--/_.\ .-""-.
43.. .-""-.___` -- \| -.__..-
44.
45.
46.Dear Internets,
47.
48.It has come to our unfortunate attention that NATO and our good friend Barrack
49.Osama-Llama 24th-century Obama have recently upped the stakes with regard to hacking.
50.They now treat hacking as an act of war. So, we just hacked an FBI affiliated website
51.(Infragard, specifically the Atlanta chapter) and leaked its user base. We also took
52.complete control over the site and defaced it, check it out if it's still up: Under construction
53.
54.While not very many logins (around 180), we'd like to take the time to point out that all
55.of them are affiliated with the FBI in some way. Most of them reuse their passwords in other places,
56.which is heavily frowned upon in the FBI/Infragard handbook and generally everywhere else too.
57.
58.One of them, Karim Hijazi, used his Infragard password for his personal gmail, and the gmail of
59.the company he owns. "Unveillance", a whitehat company that specializes in data breaches and botnets,
60.was compromised because of Karim's incompetence. We stole all of his personal emails and his company
61.emails. We also briefly took over, among other things, their servers and their botnet control panel.
62.
63.After doing so, we contacted Karim and told him what we did. After a few discussions, he offered to
64.pay us to eliminate his competitors through illegal hacking means in return for our silence. Karim,
65.a member of an FBI-related website, was willing to give us money and inside info in order to destroy
66.his opponents in the whitehat world. We even discussed plans for him to give us insider botnet information.
67.
68.Naturally we were just stringing him along to further expose the corruption of whitehats.
69.Please find enclosed Karim's full contact details and a log of him talking to us through IRC.
70.Also, enjoy 924 of his internal company emails - we have his personal gmail too, unreleased.
71.
72.We call upon journalists and other writers to delve through the emails carefully, as we have
73.uncovered an operation orchestrated by Unveillance and others to control and assess Libyan
74.cyberspace through malicious means: the U.S. government is funding the CSFI to attack Libya's
75.cyber infrastructure. You will find the emails of all 23 people involved in the emails.
76.
77.Unveillance was also involved in a scheme where they paid an Indian registrar $2000 to
78.receive 100 domains a month that may be deemed as botnet C&Cs. Shameful ploys by supposed "whitehats".
79.
80.We accept your threats, NATO. Game on, losers.
81.
82.Now we are all sons of bitches,
83.
84.Lulz Security
85.
86.
87.
88.## YOU HAVE SKIPPED OR READ THE PRETENTIOUS BORING MESSAGE AND ARE NOW ACQUIRING LULZ ##
89.
90.FBI logins/Karim chatlog/information: Link Removed due to 404 Error
91.Karim's emails (700MB): Link Removed - Invalid URL
Source: Link Removed