Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.


  1. Self-Proclaimed LulzSec “Leader” Arrested In Australia

    The Australian Federal Police (AFP) have reportedly arrested a 24-year-old hacker they claim is a leader in the LulzSec organization. We're loath to be the ones to break it to them, but LulzSec isn't really a "leaders" sort of organization, as other parties associated with the group are making clear on Twitter today.

    Read More
  2. Former LulzSec Leader Aids FBI, Assists in Series of Arrests

    A lot has changed since last summer when the Lulz were abundant and the hacking was easy. LulzSec, insane mascot of Internet chaos, sailed off into the sunset, returned, and faded away again. Anonymous continued to pepper government sites with scattered DDoS attacks, though with less and less frequency, and the affected government organizations continued to swat at their Anonymous attackers, with increasing success. But there was more to it than all that, something that has only just come to light. It seems that Sabu, the figurehead of LulzSec, actually defected late in the summer of 2011 and has been working for the FBI ever since, and now it's become clear that he played an important role in the latest series of hacker arrests.

    Read More
  3. Shady RAT: The Huge, Scary, Cyber Attack Operation You've Never Heard Of

    Last week, cyber security firm McAffee exposed a massive cyber attack operation as an object lesson for individuals, companies, and world governments to show that everyone is at risk. In a post written by Dmitri Alperovitch, McAffee's VP of Threat Research, the logs of a Remote Access Tool (RAT) revealed that over 70 organizations had been infiltrated in the last five years through a single, coordinated effort. It has been named Operation Shady RAT. According to the McAffee report, Shady RAT appears to be a case of national espionage. The list of breached systems runs the gambit from national governments (including the United States, Canada, India, Vietnam, and Taiwan), defense contractors, communications organizations, international sports organizations, and even real estate companies. While 70-odd intrusions may not seem like much -- after all, we've discussed botnets with millions of infected computers in the past. However, these are not the brute-force denial of service attacks or mere LulzCannon-ings, but sophisticated and long-term intrusions. For instance, McAffee says that the shortest intrusion lasted one month, while the longest-running operation went on for some 28 months within the International Olympic Committee.

    Read More
  4. LulzSec and Anonymous Boycott PayPal, LulzSec Member Reportedly Arrested, Again

    LulzSec and Anonymous have again teamed up and this time they are urging a boycott of PayPal. OpPayPal was announced yesterday and the weapon of choice was not, oddly enough, DDOS attacks, but a comparatively gentle boycott. As per usual, the obligatory Pastebin announcement cited motivations for the operation, which include the arrest of Anonymous and LulzSec affiliates across the globe and PayPal's continuing refusal to be associated with WikiLeaks. Anonymous is currently claiming to have been responsible for the closure of some 35,000 PayPal accounts and a reported 1 billion dollar drop in stock value, but whether this is cause and effect or just a lucky coincidence has yet to be determined. Anonymous definitely has a vested interest in spinning their facts.

    Read More
  5. FBI Arrests 14 People Suspected of Anonymous Affiliation, Participation in DDOS Attacks

    Today, the FBI launched a number of raids pertaining to Anonymous DDOS attacks and has reportedly made 14 arrests nationwide. Arrests were made in New York, California, New Jersey and Florida and four of the raids in New York (Brooklyn, the Bronx, as well as Baldwin and Merrick on Long Island) resulted in the seizure of personal computers thought to have been used in the attacks. This isn't the first time hackers, or specifically, suspected Anonymous members have been arrested. Five Anonymous-related arrests were made back in January, Ryan Cleary, a suspected Lulzsec affiliate, was arrested about a month ago, and three men suspected of ties to Anonymous were arrested in Spain a few weeks prior to that. Still, this is the largest push to arrest Anonymous affiliated hackers in the U.S. to date.

    Read More
  6. Hacker Family Tree Charts Hacker Group Relationships [Infographic]

    Hacking has been around for a long time, but now with social networking, publicized hacking groups with quirky personalities, and the increasing importance of the internet, we've been hearing a lot more about it recently. Hackers hacking this organization, threatening that organization, taunting each other, opening or closing up shop. As interesting as it is, it's all a bit much to follow and sometimes it's not even clear who's who. If you find yourself in that boat, attached is a brief, approximate and abridged family-tree/timeline of recent hacker groups and activity summarizing who came from where and worked with whom on what. Events are listed in unscaled, but roughly chronological order from top to bottom. Take a look at the full size image after the jump and impress your friends and family with facts that they probably won't understand.

    "Thats all well and good Billy, but what on Earth is a Lulzsec?"

    Read More
  7. WikiLeak-Inspired Site HackerLeaks Goes Live

    The LulzBoat may have sailed off into the sunset, but LulzSec weren't the only ones who knew how to make waves. Anonymous and the People's Liberation Front launched HackerLeaks earlier this week in a bid to make hacked information more widely accessible. The site is apparently the brainchild of several PLF members and was concieved during "Operation Orlando", an attack against the city of Orlando after the repeated arrest of members of the group "Food Not Bombs." This new site which is admittedly modeled after WikiLeaks, provides hackers with a centralized site with which they can publicize their hacked data. In the site's own words

    In both security as well as overall strategy, HackerLeaks is closely modeled on WikiLeaks. Our firstpriority is to provide a safe, secure - and anonymous way for hackers to disclose sensitive information. Our team of analysts first carefully screens each submission for any possible trace of the senders identity. Our second commitment is to ensure that each and every leak receives the maximum exposure possible in order to achieve the most profound political impact for the risks taken by those submitting material. To that end, we work with media outlets all over the world.

    Read More
  8. After 50 Days, Lulzsec Sails Into the Sunset

    Fifty days since the hacker group Lulzsec burst onto the scene by hacking the X-Factor website, the notorious group has announced that the so-called "Lulz boat" will cease to be. The announcement was posted on Pastebin and through their Twitter account, in keeping with the group's habits. In addition to their press statement, the group also delivered their final data dump. Their final message was more reflective and somber than previous announcements made by the group. In it they recount their exploits, encourage those that have supported them during the past 50 days to continue AntiSec activities, and even mention that the core group consists of six people. While many have speculated about the group's goals and motivations, their final statement suggests that they did it for more than just "the lulz." They write, "we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz." In what may be its final message, Lulzsec pointed their fans toward the hacker group Anonymous in a tweet. While this could be the end of Lulzsec, it's clear that they intend their movement to continue. Read on for the full text of the statement.

    Read More
  9. LulzSec Releases Torrent of Arizona Law Enforcement Data

    Hacker collective LulzSec has released a torrent of information it claims belongs to Arizona law enforcement, which is freely available for download, in what they are calling "Operation Chinga La Migra," something you can look up to find the meaning. The collective claims the torrent contains a large amount of personal data, including personal emails, phone numbers and names. LulzSec claims the Arizona Department of Public Safety was targeted due to the SB 1070 law, which is a strict anti-immigration law that requires Arizona immigrants to carry documents at all times. Playing Robin Hood seems a little out of the ordinary for the group, whose name and motto states that they operate "for the lulz," rather than to support some kind of stance.

    Read More
  10. Report: Lulzsec Steals UK Census Data, One Member Arrested UPDATED

    UPDATE: Lulzsec is now saying that they were unaware of any UK Census attack, and equally unaware of any arrests. More updates follow orginal story below. Last night a post appeared on Pastebin attributed to the hacker group Lulzsec claiming that they had stolen the entirety of the 2011 UK Census data. Shortly thereafter, news outlets began reporting that UK police had taken 19-year old into custody, whom  is reportedly related to the hacker group. From Pastebin:

    Greetings Internets, We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release) Myself and the rest of my Lulz shipmates will then embark upon a trip to ThePirateBay with our beautiful records for your viewing pleasure!
    Unlike previous attacks, the UK Census claim was not accompanied by any announcement over Lulzsec's Twitter feed, which has been the primary mouthpiece of the organization. 

    Read More
  11. LulzSec Launch Decentralized AntiSec Initiative, Hack More Things

    In the past couple of days LulzSec has been up to, well, a lot. After snagging and releasing 62,000 passwords last Thursday, LulzSec celebrated its 1000th twitter post with a mission statement of sorts, calling attention to the fact that they don't need to be bragging about all the targets they've hit and touching on their motivations for doing so. Their 1000th post statement says:
    Do you think every hacker announces everything they've hacked? We certainly haven't, and we're damn sure others are playing the silent game. Do you feel safe with your Facebook accounts, your Google Mail accounts, your Skype accounts? What makes you think a hacker isn't silently sitting inside all of these right now, sniping out individual people, or perhaps selling them off? You are a peon to these people. A toy. A string of characters with a value.This is what you should be fearful of, not us releasing things publicly, but the fact that someone hasn't released something publicly.

    Read More
  12. Busy Day for Lulzsec: Releases 62,000 Website Logins, Takes Down

    At 5:48 PM yesterday, hacker group Lulzsec claimed responsibility for taking down the website with a distributed denial of service attack. According to news outlets, the site was down or only intermittently accessibly until about 8:00 PM. Since the CIA site is publicly accessible, the likelihood that any sensitive information was compromised during the attack is highly unlikely. That doesn't make this attack any less embarrassing for the CIA, who surely do not take kindly to such provocations. While taking down the spy agency's website may seem like no mean feat, Lulzsec claimed on their Twitter feed that it was far from their "biggest" operation. For that, they directed users to a torrent of data gleaned from an intrusion into Sony's networks. Lulzsec followed up their attack by releasing over 62,000 password and email combinations for various web services, which apparently included Facebook and dating websites.

    Read More
  13. LulzSec, Anonymous and The Days Of Internet Rage

    Hacking seems to be on the mind of all those who utilize the Internet these days. It’s kind of a foregone conclusion that when you open something up to the vast legions of the web that it’s going to get wrecked by someone at some point. That hasn’t stopped folks from being incredibly lax about security, but this is a problem that stems from people who know little to nothing about the details making decisions in opposition to the advice they’re given from specialists. So the high-profile hacks of late were really inevitable.

    Read More
  14. Minecraft, EVE Online, The Escapist, League of Legends Hacked by Lulzsec

    Hacker group Lulzsec followed their massive porn site login dump and successful attacks against numerous game companies, by turning its sights to other gaming websites. Today, the group claimed responsibility for bringing down EVE Online, Minecraft's login server, and The Escapist website. As of writing, EVE Online and The Escapist's sites are still down, but Minecraft seems to have recovered. However, some of the groups Tweets seem to indicate that the damage may not be immediately apparent on the site. There is currently no word if any user information as affected by the intrusions. The DDOS attacks on these gaming sites were apparently motivated not by spite, but by request. As part of an event they've dubbed #TitanicTakeoverTuesday, the group is taking requests by Twitter and by phone. When the number is called, a speaker with a faux French accent using the name "Pierre Dubois" makes veiled reference to the groups Internet shenanigans. Lulzsec first rose to prominence some weeks ago after posting a fictitious article to the PBS website and otherwise defacing the site. UPDATE: Lulzsec now claims that the League of Legends login server has been taken down. (via Rock Paper Shotgun, Gamebreakers)

    Read More
  15. LulzSec Hacks Security Firm Black & Berg, Turns Down $10,000 Prize

    No reward necessary, the Lulz are enough. When cybersecurity consulting firm Black & Berg issued a challenge to hackers to change the picture on their website for a $10K reward and a position working with senior advisor Joe Black, LulzSec was more than happy to oblige. But LulzSec has said they won't be collecting the reward, leaving the message "Done, that was easy. Keep your money. We do it for the Lulz." on the Black & Berg homepage. Joe Black needn't worry about his reputation in light of the hack, as he is in good company with other LulzSec victims. The group also claims responsibility for hacks of PBS, Fox, a UK ATM, the television show X-Factor's contestant database, and InfraGuard (notable for its affiliation with the FBI) in addition to its highly publicized hack of Sony.

    Read More
  16. Nintendo Hacked by Lulzsec, but Don’t Worry

    Hacker group LulzSec, who claimed responsibility for a few recent notable hacks -- including a hack on PBS' servers that gave them control of and allowed them to deface a few of PBS' websites, as well as a hack on the FBI -- targeted a U.S. Nintendo server for one of its websites. Nintendo said the hack caused no damage and no sensitive information was stolen, nor has the hack caused any damage to the company's operations or its customers. After the hack, Lulzsec posted data on the Internet and claimed it was a Nintendo server configuration file. Nintendo acknowledged the hack, but made sure to note that the hack didn't result in any harm to Nintendo or its customers -- something important to make known after the recent month-long mess with Nintendo's competitor Sony. After Lulzsec posted the obtained data, they said they didn't mean Nintendo any harm, and they hoped Nintendo "plugs the gap," a message posted to their Twitter account. The hack comes the week Nintendo is launching their eShop for the Nintendo 3DS, the handheld's digital storefront, though it remains to be seen if the eShop launch had any weight on Lulzsec's decision to hack the Nintendo server. Though Nintendo stresses no damage was done, one can't help but assume they're beefing up their security, praying they aren't the next gaming giant to be hit by a severe hack and continuing to work on ways to doom their new handheld.

    Read More
  17. Hackers Deface PBS Website Following Frontline Report on WikiLeaks

    A hacker group trading under the name "lulzsec" was able to gain control of PBS' servers, defaced several websites, and posted an article to the PBS Newshour site claiming that deceased rapper Tupac Shakur was found alive in New Zealand. The group then posted several taunting messages to Twitter before methodically tweeting out PBS website passwords and other information the group gleaned during the attack. As of this morning, PBS was still struggling to contain the attack. The motive behind the attack seems to stem from a May, 24 Frontline report on WikiLeaks called "Wikisecrets," which the group found to not be to their liking. Some of the defaced pages also made reference to the continued incarceration of Bradley Manning, the soldier accused of leaking the documents to Wikileaks. The Frontline piece has received some criticism from Manning's supporters and Wikileaks founder Julian Assange as being an unfair and hostile portrayal of Manning and the Wikileaks operation. Attacks on Wikileaks, perceived or otherwise, has set off cyber attacks in the past, most notably with the hacker collective Anonymous. However, Lulzsec apparently claims no connection with the group. According to Wired, Lulzsec was responsible for a security breach at Sony and also for an attack on which resulted in personal information from X-Factor applications being made publicly available. To read the hacked article in its entirety, and to see other pages defaced by Lulzsec, head over to our sister site Mediaite. (via NYTimes, Wired)

    Read More
© 2015 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContact RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop