31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

that were first leaked online by Pastebin on June 5, 2011, in a post entitled “LulzSec Private Log.” The logs were republished by The<br />

Guardian three weeks later, on June 25, which garnered more mainstream media attention. Fur<strong>the</strong>r descriptions about <strong>the</strong> room and<br />

its members, and <strong>the</strong> context <strong>of</strong> <strong>the</strong>ir discussions, were sourced from interviews with Topiary and with one o<strong>the</strong>r <strong>hacker</strong>, who did not<br />

wish to be named.<br />

The detail that Adrian Lamo was diagnosed with Asperger’s is sourced from <strong>the</strong> Wired article, “Ex-Hacker Adrian Lamo<br />

Institutionalized, Diagnosed with Asperger’s,” published May 20, 2010.<br />

Chapter 20: More Sony, More Hackers<br />

Regarding LulzSec and Sony: a couple <strong>of</strong> days before <strong>the</strong> PBS attack, LulzSec had already published two databases <strong>of</strong> internal<br />

information from <strong>the</strong> website <strong>of</strong> Sony Japan. It failed to cause a stir, since Topiary had simply pasted specific <strong>We</strong>b addresses that<br />

were vulnerable to a hack by simple SQL injection. One <strong>of</strong> <strong>the</strong>m, for example, looked like this: http://www.sonymusic.co.jp/bv/cromagnons/track.php?item=7419<br />

(no longer available). Topiary announced <strong>the</strong> finds with a press release, telling o<strong>the</strong>r <strong>hacker</strong>s, “Two<br />

o<strong>the</strong>r databases hosted on this boxxy box. Go for <strong>the</strong>m if you want.” He added that <strong>the</strong> “innards” were “tasty, but not very exciting.”<br />

Details about <strong>the</strong> way LulzSec’s core and secondary members ga<strong>the</strong>red and explored website vulnerabilities within <strong>the</strong> network <strong>of</strong><br />

Sony and elsewhere were sourced from discussions with Topiary, as well as with Sabu and Kayla. Dialogue among <strong>the</strong> <strong>hacker</strong>s was<br />

also sourced from interviews with <strong>the</strong> trio. Most <strong>of</strong> <strong>the</strong> data that LulzSec stole from Sony came from <strong>the</strong> websites SonyPictures.com,<br />

SonyBMG.nl, and SonyBMG.bg—but 95 percent <strong>of</strong> <strong>the</strong> hoard came from SonyPictures.<br />

Descriptions <strong>of</strong> Topiary’s style <strong>of</strong> writing <strong>are</strong> based on my own observations <strong>of</strong> <strong>the</strong> press releases he wrote and <strong>the</strong> Twitter feed he<br />

manned.<br />

Context on <strong>the</strong> extent <strong>of</strong> <strong>the</strong> cyber attacks on Sony was sourced from <strong>the</strong> cyber security website attrition.org and its article “Absolute<br />

Sownage: A Concise History <strong>of</strong> Recent Sony Attacks.” It includes what is probably <strong>the</strong> most comprehensive table <strong>of</strong> cyber attacks on<br />

<strong>the</strong> company that took place between <strong>the</strong> months <strong>of</strong> April and July 2011.<br />

The rumors about <strong>the</strong> PlayStation Network hack involving a disgruntled employee and <strong>the</strong> sale <strong>of</strong> a database for $200,000 come from<br />

press reports and from one source within Anonymous who does not wish to be named. It was unclear if <strong>the</strong> PSN <strong>hacker</strong>s had sold it<br />

all on a carders’ market or in chunks. But in certain online markets it was possible to make $1,000 selling a six-year-old database<br />

containing <strong>the</strong> names <strong>of</strong> 300,000 users—<strong>the</strong> price in <strong>the</strong> market at large depended on <strong>the</strong> age <strong>of</strong> <strong>the</strong> database, according to people<br />

familiar with <strong>the</strong> matter. This meant that more than 100 million fresh logins from Sony would easily have been worth tens <strong>of</strong><br />

thousands <strong>of</strong> dollars. A June 23, 2011, Reuters article cited a lawsuit against Sony that claimed that <strong>the</strong> company had laid <strong>of</strong>f<br />

employees in <strong>the</strong> unit responsible for network security two weeks before <strong>the</strong> data breach occurred, and that while <strong>the</strong> company “spent<br />

lavishly” on security to protect its own corporate data it failed to do <strong>the</strong> same for its customer data. The lawsuit, filed in a U.S. District<br />

Court, cited a “confidential witness.”<br />

Details about <strong>the</strong> way LulzSec attacked Karim Hijazi come from interviews with Topiary and Kayla, as well as from chat logs released<br />

by both LulzSec and Hijazi. Fur<strong>the</strong>r details come from telephone interviews with Hijazi in <strong>the</strong> days after his attack was announced<br />

and from interviews with his press spokesman.<br />

Details about <strong>the</strong> ~el8 hacking group were sourced from <strong>the</strong>ir four e-zines, which <strong>are</strong> still available online, and from <strong>the</strong> 2002 Wired<br />

article “White-Hat Hate Crimes on <strong>the</strong> Rise.”<br />

Details about Andrew “weev” Auernheimer’s disclosure <strong>of</strong> a security flaw for iPad users on AT&T’s website were sourced from<br />

interviews with Auernheimer, from <strong>the</strong> Gawker story “Apple’s Worst Security Breach: 114,000 iPad Owners Exposed,” dated June<br />

9, 2010, and from <strong>the</strong> CNET article “AT&T-iPad Site Hacker to Fight on in Court,” published on September 12, 2011. In July 2011,<br />

a federal grand jury in Newark, New Jersey, indicted Auernheimer on one count <strong>of</strong> conspiracy to gain access to computers and one<br />

count <strong>of</strong> identity <strong>the</strong>ft. From September 2011 and as <strong>of</strong> mid-April 2012, he was on bail, and reportedly banned from using IRC or<br />

consorting with people from his hacking group.<br />

The statement that <strong>the</strong> AnonOps IRC was “a mess, everyone was on edge” was sourced from my own observations <strong>of</strong> <strong>the</strong> chat network<br />

and from interviews with Topiary.<br />

The assertion that a few white hats “secretly wished <strong>the</strong>y could be part <strong>of</strong> <strong>the</strong> fun” was sourced from my observations <strong>of</strong> comments<br />

made by white hat security specialists on blogs and on Twitter, which <strong>of</strong>ten pr<strong>of</strong>essed admiration for LulzSec and expressed gratitude<br />

that <strong>the</strong> group had demonstrated <strong>the</strong> necessity <strong>of</strong> <strong>the</strong> Internet security pr<strong>of</strong>ession. A good example is <strong>the</strong> article by Australian security<br />

expert Patrick Gray on his risky.biz blog entitled “Why <strong>We</strong> Secretly Love LulzSec,” posted on June 8, 2011. The post quickly went<br />

viral on Twitter.<br />

Regarding Ryan’s DDoS attack on LulzSec’s public IRC channel—he had been sending <strong>the</strong> same message to anyone who was an<br />

operator in <strong>the</strong> IRC channel.<br />

Chapter 21: Stress and Betrayal<br />

Details about Kayla’s side operation were sourced from interviews with Kayla and Topiary, while dialogue in this chapter was sourced<br />

from <strong>the</strong> leaked #pure-elite logs. Fur<strong>the</strong>r context on <strong>the</strong> InfraGard hack, #pure-elite discussions, and Bitcoin donations comes from<br />

interviews with <strong>the</strong> founding members <strong>of</strong> LulzSec. Some dialogue, such as <strong>the</strong> reaction to <strong>the</strong> $7,800 BitCoin donation, was also<br />

sourced from interviews.<br />

NATO’s draft report on Anonymous can be found on <strong>the</strong> organization’s website here: http://www.nato-pa.int/default.asp?<br />

SHORTCUT=2443. It was first mentioned on tech blogs, such as thinq, in early June.<br />

The deleting code rm -rf/* is well known among <strong>We</strong>b trolls, who at one time made a practice <strong>of</strong> telling Mac and Linux users to type <strong>the</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!