News

LulzSec Reborn Takes Credit for Leaks of Military Personal Info

A group calling itself "LulzSec Reborn" released the usernames and passwords of 170,937 subscribers to a military online dating service on Sunday.

The group publicized the information taken from MilitarySingles.com and cited Microsoft domains among the military ones. "The website http://www.militarysingles.com/ was recently closed day ago or so, so we dumped email db," said the group in a Pastebin post. "There are emails such as @us.army.mil ; @carney.navy.mil ; @greatlakes.cnet.navy.mil ; @microsoft.com ; etc."

In the wake of the attack, Robert Goebel, CEO of ESingles Inc., said that the company, which runs MilitarySingles.com, is looking for ways to increase its security. "We have enacted a series of security procedures in response," said Goebel to the Los Angeles Times. "Regardless of whether it was a true claim or false claim, we're treating it as though it's true just to be safe."

Goebel said he believes that there was no hack involved with LulzSec Reborn's information dump. The site was down for some time over the weekend, but that was due to scheduled maintenance, he said. Goebel also believes the validity of the info dump is not accurate as MilitarySingles.com only has 140,000 members.

"It's probably [LulzSec Reborn] trying to make a name for themselves or something," Goebel said. "Just because we have the name 'military' in it, that might be why they decided to claim they went after us."

Commenting on the purpose for the apparent return of the LulzSec hacker group, an anonymous member claiming to be a part of the collective told the following to Softpedia: "[We want to] continue where old LulzSec stopped, to hack military and government sites and leak their databases full of sensitive information to the public," said a LulzSec member. "We also want to avenge the ones that were arrested, besides Sabu because we blame him for everything. We all worked with him and we were blind to see that he was a snitch."

Five members suspected of being part of the original LulzSec group were arrested last month based on information provided to the FBI by the group's leader, who went by the name of "Sabu."

This week's data dump looks to be the first action taken by a group under the LulzSec moniker since its 50-day campaign of hacks and leaks ended last summer.

According to the Softpedia article, the new team was formed last month and contains 10 to 20 full-time members -- many of which worked with the original LulzSec hacker group.

About the Author

Chris Paoli is the site producer for Redmondmag.com and MCPmag.com.

Featured

  • OneDrive Users To Get Storage Options, Plus New Personal Vault

    Microsoft announced a few OneDrive enhancements, including storage-option additions, plus a new "Personal Vault" feature for added security assurance.

  • Cloud Services Starting To Overtake On-Prem Database Management Systems

    Database management system (DBMS) growth is happening more on the cloud services side than on the traditional "on-premises" side, according to a report by Gartner Inc.

  • How To Replace an Aging Domain Controller

    If the hardware behind your domain controllers has become outdated, here's a step-by-step guide to performing a hardware refresh.

  • Azure Backup for SQL Server 2008 Available at Preview Stage

    Microsoft added the option of using the Azure Backup service to provide recovery support for SQL Server 2008 and SQL Server 2008 R2 when those workloads are hosted on Azure virtual machines.

comments powered by Disqus

Office 365 Watch

Sign up for our newsletter.

Terms and Privacy Policy consent

I agree to this site's Privacy Policy.