Wait, what?

Looks like you came here from Geekosystem. Don't worry, everything is still here. We've just combined forces with The Mary Sue to bring you more and better content, all in one place.


  1. Self-Proclaimed LulzSec “Leader” Arrested In Australia

    The Australian Federal Police (AFP) have reportedly arrested a 24-year-old hacker they claim is a leader in the LulzSec organization. We're loath to be the ones to break it to them, but LulzSec isn't really a "leaders" sort of organization, as other parties associated with the group are making clear on Twitter today.

    Read More
  2. Former LulzSec Leader Aids FBI, Assists in Series of Arrests

    A lot has changed since last summer when the Lulz were abundant and the hacking was easy. LulzSec, insane mascot of Internet chaos, sailed off into the sunset, returned, and faded away again. Anonymous continued to pepper government sites with scattered DDoS attacks, though with less and less frequency, and the affected government organizations continued to swat at their Anonymous attackers, with increasing success. But there was more to it than all that, something that has only just come to light. It seems that Sabu, the figurehead of LulzSec, actually defected late in the summer of 2011 and has been working for the FBI ever since, and now it's become clear that he played an important role in the latest series of hacker arrests.

    Read More
  3. Shady RAT: The Huge, Scary, Cyber Attack Operation You've Never Heard Of

    Last week, cyber security firm McAffee exposed a massive cyber attack operation as an object lesson for individuals, companies, and world governments to show that everyone is at risk. In a post written by Dmitri Alperovitch, McAffee's VP of Threat Research, the logs of a Remote Access Tool (RAT) revealed that over 70 organizations had been infiltrated in the last five years through a single, coordinated effort. It has been named Operation Shady RAT. According to the McAffee report, Shady RAT appears to be a case of national espionage. The list of breached systems runs the gambit from national governments (including the United States, Canada, India, Vietnam, and Taiwan), defense contractors, communications organizations, international sports organizations, and even real estate companies. While 70-odd intrusions may not seem like much -- after all, we've discussed botnets with millions of infected computers in the past. However, these are not the brute-force denial of service attacks or mere LulzCannon-ings, but sophisticated and long-term intrusions. For instance, McAffee says that the shortest intrusion lasted one month, while the longest-running operation went on for some 28 months within the International Olympic Committee.

    Read More
  4. LulzSec and Anonymous Boycott PayPal, LulzSec Member Reportedly Arrested, Again

    LulzSec and Anonymous have again teamed up and this time they are urging a boycott of PayPal. OpPayPal was announced yesterday and the weapon of choice was not, oddly enough, DDOS attacks, but a comparatively gentle boycott. As per usual, the obligatory Pastebin announcement cited motivations for the operation, which include the arrest of Anonymous and LulzSec affiliates across the globe and PayPal's continuing refusal to be associated with WikiLeaks. Anonymous is currently claiming to have been responsible for the closure of some 35,000 PayPal accounts and a reported 1 billion dollar drop in stock value, but whether this is cause and effect or just a lucky coincidence has yet to be determined. Anonymous definitely has a vested interest in spinning their facts.

    Read More
  5. FBI Arrests 14 People Suspected of Anonymous Affiliation, Participation in DDOS Attacks

    Today, the FBI launched a number of raids pertaining to Anonymous DDOS attacks and has reportedly made 14 arrests nationwide. Arrests were made in New York, California, New Jersey and Florida and four of the raids in New York (Brooklyn, the Bronx, as well as Baldwin and Merrick on Long Island) resulted in the seizure of personal computers thought to have been used in the attacks. This isn't the first time hackers, or specifically, suspected Anonymous members have been arrested. Five Anonymous-related arrests were made back in January, Ryan Cleary, a suspected Lulzsec affiliate, was arrested about a month ago, and three men suspected of ties to Anonymous were arrested in Spain a few weeks prior to that. Still, this is the largest push to arrest Anonymous affiliated hackers in the U.S. to date.

    Read More
  6. Hacker Family Tree Charts Hacker Group Relationships [Infographic]

    Hacking has been around for a long time, but now with social networking, publicized hacking groups with quirky personalities, and the increasing importance of the internet, we've been hearing a lot more about it recently. Hackers hacking this organization, threatening that organization, taunting each other, opening or closing up shop. As interesting as it is, it's all a bit much to follow and sometimes it's not even clear who's who. If you find yourself in that boat, attached is a brief, approximate and abridged family-tree/timeline of recent hacker groups and activity summarizing who came from where and worked with whom on what. Events are listed in unscaled, but roughly chronological order from top to bottom. Take a look at the full size image after the jump and impress your friends and family with facts that they probably won't understand.

    "Thats all well and good Billy, but what on Earth is a Lulzsec?"

    Read More
  7. WikiLeak-Inspired Site HackerLeaks Goes Live

    The LulzBoat may have sailed off into the sunset, but LulzSec weren't the only ones who knew how to make waves. Anonymous and the People's Liberation Front launched HackerLeaks earlier this week in a bid to make hacked information more widely accessible. The site is apparently the brainchild of several PLF members and was concieved during "Operation Orlando", an attack against the city of Orlando after the repeated arrest of members of the group "Food Not Bombs." This new site which is admittedly modeled after WikiLeaks, provides hackers with a centralized site with which they can publicize their hacked data. In the site's own words

    In both security as well as overall strategy, HackerLeaks is closely modeled on WikiLeaks. Our firstpriority is to provide a safe, secure - and anonymous way for hackers to disclose sensitive information. Our team of analysts first carefully screens each submission for any possible trace of the senders identity. Our second commitment is to ensure that each and every leak receives the maximum exposure possible in order to achieve the most profound political impact for the risks taken by those submitting material. To that end, we work with media outlets all over the world.

    Read More
  8. After 50 Days, Lulzsec Sails Into the Sunset

    Fifty days since the hacker group Lulzsec burst onto the scene by hacking the X-Factor website, the notorious group has announced that the so-called "Lulz boat" will cease to be. The announcement was posted on Pastebin and through their Twitter account, in keeping with the group's habits. In addition to their press statement, the group also delivered their final data dump. Their final message was more reflective and somber than previous announcements made by the group. In it they recount their exploits, encourage those that have supported them during the past 50 days to continue AntiSec activities, and even mention that the core group consists of six people. While many have speculated about the group's goals and motivations, their final statement suggests that they did it for more than just "the lulz." They write, "we truly believe in the AntiSec movement. We believe in it so strongly that we brought it back, much to the dismay of those looking for more anarchic lulz." In what may be its final message, Lulzsec pointed their fans toward the hacker group Anonymous in a tweet. While this could be the end of Lulzsec, it's clear that they intend their movement to continue. Read on for the full text of the statement.

    Read More
  9. LulzSec Releases Torrent of Arizona Law Enforcement Data

    Hacker collective LulzSec has released a torrent of information it claims belongs to Arizona law enforcement, which is freely available for download, in what they are calling "Operation Chinga La Migra," something you can look up to find the meaning. The collective claims the torrent contains a large amount of personal data, including personal emails, phone numbers and names. LulzSec claims the Arizona Department of Public Safety was targeted due to the SB 1070 law, which is a strict anti-immigration law that requires Arizona immigrants to carry documents at all times. Playing Robin Hood seems a little out of the ordinary for the group, whose name and motto states that they operate "for the lulz," rather than to support some kind of stance.

    Read More
  10. Report: Lulzsec Steals UK Census Data, One Member Arrested UPDATED

    UPDATE: Lulzsec is now saying that they were unaware of any UK Census attack, and equally unaware of any arrests. More updates follow orginal story below. Last night a post appeared on Pastebin attributed to the hacker group Lulzsec claiming that they had stolen the entirety of the 2011 UK Census data. Shortly thereafter, news outlets began reporting that UK police had taken 19-year old into custody, whom  is reportedly related to the hacker group. From Pastebin:

    Greetings Internets, We have blissfully obtained records of every single citizen who gave their records to the security-illiterate UK government for the 2011 census We're keeping them under lock and key though... so don't worry about your privacy (...until we finish re-formatting them for release) Myself and the rest of my Lulz shipmates will then embark upon a trip to ThePirateBay with our beautiful records for your viewing pleasure!
    Unlike previous attacks, the UK Census claim was not accompanied by any announcement over Lulzsec's Twitter feed, which has been the primary mouthpiece of the organization. 

    Read More
© 2015 The Mary Sue   |   About UsAdvertiseNewsletterJobsContributorsComment PolicyPrivacyUser AgreementDisclaimerContact RSS

Dan Abrams, Founder
  1. Mediaite
  2. The Mary Sue
  3. Styleite
  4. The Braiser
  5. SportsGrid
  6. Gossip Cop