The hacker group LulzSec has attacked once again. This time it wasn’t Sony, but the very same CIA website. According to a report by Reuters, this is the second time that the group hacks a government site. LulzSec made it public through their Twitter account that they were the ones responsible for the attack, and that they had the opportunity to even download information from the site.
On the other hand, the CIA announced that fortunately they have been a step ahead from LulzSec, and that so far they haven’t been able to get a hold of important information. The CIA has been able to block the group from the principal Senate network.
LulzSec has been successful in previous attacks that targeted companies such as PBS, Sony, Nintendo, and Fox. Sony took a big hit when the group stole the confidential information in regards to those customers that used their PlayStation console. In the last two weeks they also attacked Brink gaming servers, where they took a wide variety of source codes and gaming passwords. The group made it clear that they were not jeopardizing users information, because they actually liked the company. They proceeded to make the information available on the web.
LulzSec’s first tweet in regards to the CIA attack read like this:
Tango down – cia.gov – for the lulz.
It seems that the group has been playing around with smaller and easier targets, perhaps just to give time for their major attacks. Until now, they seem to be testing the waters with the CIA, since they were unable – or perhaps unwilling – to take anything from the site.
LulzSec referred to the day of the CIA attack as “TitanicTakeoverTuesday”, and they call their DDoS “Low Orbit Ion Cannon”. The group also seems to play like celebrities, since every day they are garnering more and more followers. However, according to different surveys and polls, most people don’t condone the actions made by the group.
Part of the tactic that the group has been using is revealing an actual phone number. Something quite interesting and intriguing, but of course when someone calls the call gets redirected or forwarded to the number that the group chooses. Some have the hopes that this phone line somehow traces back to the masterminds behind all of the attacks.
According to the group, every second there are from five to twenty different people calling their number. They posted on Twitter that they have the ability of forwarding the calls to any place on earth, and even asked their followers for suggestions. They spent the last few days playing around; first they forwarded the calls to Magnets, then to the FBI, and then to HBGary.
LulzSec’s attacks seem to be far from over.