31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

December 4, 2010—An announcement posted on Anonops.net states that Anonymous plans to attack “various targets related to<br />

censorship” and that Operation Payback has “come out in support <strong>of</strong> WikiLeaks.”<br />

December 6, 2010—Organizers on AnonOps launch a DDoS attack on postFinance.ch, a Swiss e-payment company that has also<br />

blocked funding services to WikiLeaks. Roughly 900 people join in <strong>the</strong> #operationpayback chat room on AnonOps and around 500 join in<br />

<strong>the</strong> attack by using LOIC.<br />

December 8, 2010—AnonOps launches a DDoS attack on PayPal.com, using 4,500 volunteers with LOIC but only becoming successful<br />

when one person using a botnet takes <strong>the</strong> site fully <strong>of</strong>fline. Some 7,800 people have now joined <strong>the</strong> #operationpayback chat room. Later that<br />

day <strong>the</strong>y hit MasterCard.com and Visa.com, which have also nixed funding services for WikiLeaks, taking both sites <strong>of</strong>fline for about twelve<br />

hours.<br />

December 9, 2010—Botnet controllers who had previously helped take down PayPal.com, MasterCard.com, and Visa.com turn on <strong>the</strong><br />

operators <strong>of</strong> AnonOps and start attacking <strong>the</strong> IRC network, upsetting a planned attack on Amazon that day.<br />

December 11, 2010—Dutch police arrest nineteen-year-old Martijn “Awinee” Gonlag for using LOIC to participate in an Anonymous<br />

DDoS attack, among <strong>the</strong> first <strong>of</strong> scores more arrests in Europe and <strong>the</strong> United States over <strong>the</strong> next year.<br />

December 15, 2010—A member <strong>of</strong> PayPal’s cyber security team gives a USB thumb drive to <strong>the</strong> FBI that contains <strong>the</strong> IP addresses <strong>of</strong><br />

1,000 individuals who had used LOIC to attack PayPal.<br />

Mid-December 2010—AnonOps administrators grapple with maintenance as <strong>the</strong>ir network is continually attacked, leaving <strong>the</strong>m unable to<br />

oversee strategy. As a result, Operation Payback splinters into several side operations, such as Operation Leakspin, Operation OverLoad, and<br />

an attack on Sarah Palin’s <strong>of</strong>ficial website.<br />

Mid-December 2010—A few technically skilled supporters <strong>of</strong> AnonOps create a private IRC channel <strong>of</strong>f <strong>the</strong> network called<br />

#InternetFeds, where about thirty black hat <strong>hacker</strong>s—such as Sabu, Tflow, and Kayla, along with o<strong>the</strong>r interested Anons who have been<br />

<strong>of</strong>fered invitations to <strong>the</strong> channel—can discuss future operations.<br />

Early January 2011—The <strong>hacker</strong>s in #InternetFeds discuss raids against websites <strong>of</strong> repressive Middle Eastern regimes like Tunisia,<br />

where popular democratic uprisings <strong>are</strong> currently taking place. The <strong>hacker</strong> Tflow writes a <strong>We</strong>b script that allows Tunisians to circumvent<br />

government <strong>We</strong>b snooping, while Sabu hacks and defaces <strong>the</strong> website <strong>of</strong> <strong>the</strong> Tunisian prime minister with a message from Anonymous.<br />

Mid- to late January 2011—Members <strong>of</strong> #InternetFeds continue to collaborate on hacking and defacing <strong>the</strong> websites <strong>of</strong> o<strong>the</strong>r Middle<br />

Eastern governments, including Algeria and Egypt.<br />

January 27, 2011—British police arrest five men in connection with <strong>the</strong> Operation Payback attacks on PayPal, MasterCard, and Visa,<br />

including AnonOps operators nicknamed Nerdo and Fennic.<br />

February 4, 2011—A small group <strong>of</strong> <strong>hacker</strong>s from #InternetFeds meets in ano<strong>the</strong>r private IRC channel to discuss an attack on IT security<br />

firm HBGary Federal, after its CEO is quoted in <strong>the</strong> Financial Times that day as saying that he was investigating Anonymous and had<br />

uncovered <strong>the</strong> true identities <strong>of</strong> its core leaders.<br />

February 6, 2011—News breaks that “Anonymous” has stolen tens <strong>of</strong> thousands <strong>of</strong> Aaron Barr’s corporate e-mails, as well as those <strong>of</strong><br />

two executives at sister company HBGary Inc.; it also takes over his Twitter feed and DDoSes and defaces his site.<br />

Early to mid-February—The same group from #InternetFeds publishes Aaron Barr’s private e-mails on an e-mail viewer. Journalists and<br />

supporters discover Barr had been proposing controversial cyber attacks on WikiLeaks and opponents <strong>of</strong> <strong>the</strong> U.S. Chamber <strong>of</strong> Commerce.<br />

Barr resigns.<br />

February 24, 2011—Anonymous conducts a live hack and deface <strong>of</strong> a website belonging to <strong>the</strong> controversial <strong>We</strong>stboro Baptist Church,<br />

while Anonymous supporter Topiary confronts a <strong>We</strong>stboro representative on a radio program. The resultant YouTube video receives more<br />

than one million hits.<br />

Mid- to late February 2011—Jennifer Emick, a former supporter <strong>of</strong> Chanology turned anti-Anonymous campaigner, decides to<br />

investigate <strong>the</strong> true identities <strong>of</strong> key Anonymous <strong>hacker</strong>s and supporters and uncovers details about Sabu, aka Hector Monsegur.<br />

Mid-March 2011—Emick and a handful <strong>of</strong> colleagues publish a list <strong>of</strong> seventy names, including Monsegur’s, under <strong>the</strong> guise <strong>of</strong> a cyber<br />

security company called Backtrace. Soon after, Emick is contacted by <strong>the</strong> FBI.<br />

April 1, 2011—Supporters <strong>of</strong> Anonymous publish a digital flyer declaring war on Sony after <strong>the</strong> company sues a <strong>hacker</strong> named George<br />

“Geohotz” Hotz. They follow this up with a DDoS attack on Sony websites and <strong>the</strong> Sony PlayStation Network, greatly upsetting gamers.<br />

April 7, 2011—Organizers with Anonymous call <strong>of</strong>f <strong>the</strong> DDoS attacks on Sony, saying <strong>the</strong>y do not wish to disrupt <strong>the</strong> PlayStation<br />

Network, but <strong>the</strong> network remains <strong>of</strong>fline for <strong>the</strong> rest <strong>of</strong> <strong>the</strong> month.<br />

April 2011—Topiary and Sabu discuss breaking away from Anonymous, <strong>the</strong>n decide to get <strong>the</strong> team <strong>of</strong> attackers behind <strong>the</strong> HBGary<br />

assault back toge<strong>the</strong>r to collaborate on more raids. The <strong>hacker</strong>s Tflow and Kayla rejoin Topiary and Sabu, along with ano<strong>the</strong>r Anonymous<br />

supporter named AVunit and, later, an Irish <strong>hacker</strong> nicknamed Pwnsauce. The group <strong>of</strong> six forms a <strong>hacker</strong> splinter group that is not<br />

constrained by even <strong>the</strong> loosest principles <strong>of</strong> Anonymous—such as not attacking media companies. They call <strong>the</strong> group LulzSec. They begin<br />

scouring high-pr<strong>of</strong>ile websites for vulnerabilities that “rooters” like Sabu and Kayla can <strong>the</strong>n exploit to steal and publish data.<br />

May 2, 2011—Sony announces an intrusion to its network in mid-April, which has compromised <strong>the</strong> personal and financial details <strong>of</strong><br />

more than 75 million PlayStation Network accounts. Though Anonymous has not taken responsibility, Sony later claims that <strong>the</strong> <strong>hacker</strong>s left<br />

a file marked with <strong>the</strong> words “Anonymous” and “<strong>We</strong> Are Legion.”<br />

May 9, 2011—A former operator within AnonOps goes rogue, publishing a list <strong>of</strong> 653 usernames and IP addresses, which, if not<br />

protected with VPNs or o<strong>the</strong>r proxies, could identify <strong>the</strong> people behind <strong>the</strong>m.<br />

May 7, 2011—LulzSec announces on Twitter, via <strong>the</strong> new account @<strong>lulzse</strong>c, that it has hacked Fox.com and published a confidential<br />

database <strong>of</strong> potential contestants in <strong>the</strong> TV talent show The X Factor.<br />

May 30, 2011—LulzSec hacks into <strong>the</strong> computer network <strong>of</strong> PBS after its PBS NewsHour program broadcasts a documentary on<br />

WikiLeaks that <strong>the</strong> group claims to dislike. LulzSec publishes a list <strong>of</strong> e-mail addresses and passwords for PBS employees, while Topiary<br />

writes a spo<strong>of</strong> news article about <strong>the</strong> murdered rapper Tupac Shakur being found alive, publishing it through <strong>the</strong> PBS NewsHour website.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!