• Post author:
  • Post category:Security
  • Post comments:10 Comments
  • Reading time:4 mins read

Last Updated on July 4, 2011

Original Image by Ars Technica
Original Image by Ars Technica

Like the rest of the information security world, I have been impressed enough by the 50 days of Lulz. Even if one agrees with the detractors which claim that, after the first PSN hack, the LulzSec releases are of poor quality, it is unquestionable that the crew of the Lulz boat has contributed to make to the world aware, although with controversial methods and purposes, about the risks of data security. Moreover the list of their targets shows that this applies both to private and public inistitutions: from corporations to governments.

However there is another aspect I was particularly impressed by, and it was the war fought behind the scene between the bad guys (the LulzSec team), and the good guys as two main characters: an ethical hacker former military called @th3j35ter (already known also for hactivism) and a team of web sentinels, who called themselves Web Ninjas).

Since other characters played a primary role in this modern war as well (@on3iroi and a group called the A-Team), making the timeline and the scene of the crime further complicated and intriguing, I tried to collect all the possible information and references in the picture below. The whole story looks like a mix between a spaghetti western in modern sauce with a spy story (probably Hollywood scriptwriters should consider it for a movie).

What was the most impressive aspect according to my personal opinion? For sure the use of social media for intelligence purposes. Have a look at the way the first member of LulzSec Team Nakomis, was unmasked by @th3j35t3r. Is it Social Espionage, isn’t it?


1 http://www.mediaite.com/online/exclusive-gawker-hacker-gnosis-explains-method-and-reasoning-behind-his-actions/
2 http://pastebin.com/iVujX4TR
3 http://www.thetechherald.com/article.php/201106/6785/Report-HBGary-used-as-an-object-lesson-by-Anonymous
4 http://blog.imperva.com/2011/06/lulzsec-profile-who-are-they.html
5 http://lulzsecexposed.blogspot.com/2011/06/profiles.html
6 http://lulzsecurity.com/releases/50%20Days%20of%20Lulz.txt
7 http://www.theatlanticwire.com/technology/2011/06/lulzsec-enemies-list-might-be-its-undoing/39452/
8 http://th3j35t3r.wordpress.com/2011/06/16/quick-n-dirty-just-for-clarification/
9 http://lulzsecexposed.blogspot.com/2011/06/joepie-doxed.html
10 http://lulzsecexposed.blogspot.com/2011/06/barret-brown-doxed.html
11 http://lulzsecexposed.blogspot.com/2011/06/topiary-doxed.html
12 http://lulzsecexposed.blogspot.com/2011/06/sabu-doxed.html
13 http://lulzsecexposed.blogspot.com/2011/06/neuron-and-redacted.html
14 http://pastebin.com/MBEsm5XQ
15 http://pastebin.com/XDXyQ5KQ
16 http://pastebin.com/76TsPHeU
17 http://on3iroi.wordpress.com/
18 http://gawker.com/5816291
19 http://lulzsecexposed.blogspot.com/2011/06/laurelai-doxed.html
20 http://www.local12.com/News/Local/story/Butler-County-Teen-Named-In-International-Hacking/QqKIDb9J-UeDCFRFRmb98Q.cspx

This Post Has 10 Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.