Print 74 comment(s) - last by EricMartello.. on Jun 20 at 12:15 AM

The Lulz ship is busy firing its DDoS "cannons" at hapless gamers.  (Source: LulzSec)

The group claims to infected users of 4Chan's "random" (/b/) board to use as a botnet for DDoS attacks.  (Source: StarCraft Mazter)
Group is waiting to address more takedown requests, says DDoS attacks aren't real hacks

Legendary griefers LulzSec ("Lulz Security") -- the self-proclaimed "concentrated-success" of 4Chan's 2005-era /b/ message board -- don't seem overly concerned about being "hunted down" by 2011-era /b/ fans ("damn furries" or "/b/tards" as LulzSec calls them). Fans flocked to the message board upset about LulzSec's attacks on popular gaming services like EVE Online.

The group proclaimed on Tuesday:

Call into 614-LULZSEC and pick a target and we'll obliterate it. Nobody wants to mess with The Lulz Cannon - take aim for us, twitter. #FIRE

In addition to attacks on League of LegendsEVE Online, and Minecraft, the group attacked gaming magazine The Escapist, and government-software contractor Finfisher, as we summarize here.

But the group also let slip that it's waiting on 8 phone requests for additional targets.  It's unclear whether the group will hit those targets today, or take a break from firing its DDoS "cannon".

LulzSec implied in one tweet that it's infecting 4Chan users and using their machines in a distributed denial of service (DDoS) botnet.  The group writes:

The best part about making 50% of all /b/tards our bots is that they leave their daddy's laptops on 24/7, more bandwidth for us. :3

The fact that the group is taking phone calls at a time when they've attacked the U.S. government from several angles is rather bold -- some would say foolish.  Clearly the art of phone obfuscation is not dead, given that no arrests have been made yet, despite the group's active call line, which is surely being observed by the U.S. Federal Bureau of Investigation and others.

DDoS hacks aren't "official" hacks according to the band of bandits.  They state:

We didn't hack any games, we just DDoS'd them with our not-to-be-messed-with Lulz Cannon. :D We did hack these though:

We'll keep you updated on who gets hacked/DDoSed next "for the lulz".

Update: Wed. June 15, 2011 12:50 p.m. --

It appears that LulzSec has taken down the server for MMORPG Heroes of Newerth (a game very similar to World of Warcraft).  The group mocks that Defense of the Ancients ("DotA") custom scenario for Warcraft III: Reign of Chaos "is better."

The group also posted to Twitter that it's preparing for another EVE Online attack.

Comments     Threshold

This article is over a month old, voting and posting comments is disabled

RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:25:35 PM , Rating: 2
What? What "World DB" are we talking about? It is a Dell owned IP, they host their crap from it. There is no magic button on the Internet to shut it down, everything is distributed. You are worrying me, cause it seems like you don't understand networks at all.

RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 12:42:31 PM , Rating: 2
I wasn't talking about shutting down. There is a Dell World Database behind login server. Its just a login server for Dell Intranet. The european one BTW. The databases are in the US and AUS. You can track them easy when after you entered it. And yes, their databases are centralized, not distribuited around the world. Don't ask me how i know this.

I didn't talked about DDoSing it would be just a mild annoyance. Or I wasn't completely clear about it.

RE: I called, nobody home.
By Gzus666 on 6/15/2011 12:49:41 PM , Rating: 2
OK, and? Why would this be advantageous? They said you call the number and they will DDOS the thing, not hack it. What exactly are you expecting them to accomplish by taking down a Dell login server?

Side note, if it is Intranet, I doubt it would be public facing.

RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 1:04:39 PM , Rating: 2
It is accessible from the outside. Just ICMP is off and has one or two limitations. It is basically a login server.

DDoS would be a mild annoyance anyway. DBs are up, but login servers would be down.

RE: I called, nobody home.
By Gzus666 on 6/15/2011 2:17:02 PM , Rating: 2
So this all goes back to what would be the point? You took down an intranet for a little while? They could just turn off the route from the outside and they still have internal company Intranet and they could just VPN to hit it. I guess I'm confused why you are targeting Dell most of all, considering they haven't done anything.

RE: I called, nobody home.
By RadnorHarkonnen on 6/15/2011 6:43:51 PM , Rating: 1
Maybe to you they didn't. But even the tin man sometimes has to take a fall.

I would love to see Dell in the attacks, first for personal reasons, and second because that network is shit easy to take down and the whole IT infrastructure is a castle of cards.

Sony and others that suffered silly attacks, only fell for it, because they cheapened too much what was supposed to be safe. Dell has a massive centralized DB (Support/Sales/Logistics and much much more) with weak IT infrastructure and little protection or redundancy. Sitting Duck,

RE: I called, nobody home.
By Gzus666 on 6/15/2011 7:53:25 PM , Rating: 2
You are either a complete fool or the greatest troll I have seen in a while. If you are the latter, hats off to you sir.

Hacking actual network equipment or taking down actual networks is VERY tough beyond just DDOSing things. Most of these hacks are just known server vulnerabilities, they aren't amazing, they are just taking advantage of crappy admins.

I hope you aren't in IT, but if you worked in IT you would see a large portion of the people you encounter there, especially your regular old Windows admins, are not that good. On top of that, people are naturally lazy and companies are cheap, so patches and updates don't happen and things aren't secured all that well.

"If you mod me down, I will become more insightful than you can possibly imagine." -- Slashdot
Related Articles
Welcome to 2011, Year of the Hacker
June 14, 2011, 9:40 PM

Copyright 2016 DailyTech LLC. - RSS Feed | Advertise | About Us | Ethics | FAQ | Terms, Conditions & Privacy Information | Kristopher Kubicki