Personal details about LulzSec members slowly being leaked
If you’ve been living under a rock for the past few months, you have missed all the news about LulzSec (Lulz Security). The group of self-proclaimed internet vigilantes are responsible for the PSN outage and bringing down Sony Pictures, the FBI, PBS, Fox.com and Xfactor (to name a few). They were initially praised for their proficiency in attacking “evil” companies, but recently, LulzSec’s reputation to the mainstream has turned sour.
“LulzSecExposed” attempts to expose the members running LulzSec
LulzSec has remained anonymous since they began operation, and you’d understand why — they are taking down high profile sites left and right — but some people really want to know who LulzSec are. A blog that was launched on Friday, dedicated to uncovering the members of LulzSec, has published dozens of articles in a matter of days, detailing the members of LulzSec.
This includes photos, phone numbers, addresses, names, biographies and IP addresses. They have also published a few chat-logs from private IRC rooms occupied by the LulzSec members and they are pretty interesting to sift through. Just please, don’t go on a rampage emailing these emails, or trying to spam them with phone-calls… it probably wont do you any good.
Visit — The LulzSecExposed blog
Why people are beginning to dislike LulzSec
Most of the attacks LulzSec has performed have been “for the greater good”, forcing companies to instate stronger security for customers and publicly shaming them. The rest of the world applauded LulzSec for their efforts, but recently, it appears as if LulzSec has run out of things to do. They have hacked things (for the Lulz of course) that don’t need to be hacked, and they are beginning to really be a nuisance to everyone, and not just the companies they’re attacking (especially people who just want to play their new games they paid for). 4Chan’s Anonymous has also been fuming with anger for a long while, trying to out-smart LulzSec.
Their ethics aren’t all that fair either — usually when white-hat hackers find an exploit in an online service, they do what they can (collect contact info, scrape customer databases and how they breached security) and then they contact the company and present the info they found, asking them to straighten up. ONLY when the company ignores the claims, or doesn’t respond is when the hackers publicly release the info (if it was encrypted, they leave it encrypted).
LulzSec ignores the companies entirely, and releases the hacked goods without contacting the company, putting the users at risk. From what we can gather, all of these attacks on online services hurt the users much more in the end, rather than the company. For some companies, it actually turns into free press (no press is bad press) and it seems as if the users are just an afterthought — but it’s for the Lulz right?
PS: You should probably check out the LulzSec Themesong… it’s pretty awesome.