31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

a mixture <strong>of</strong> Anons, script kiddies, general fans who had heard about LulzSec from media reports, and white hat <strong>hacker</strong>s. Over time <strong>the</strong><br />

LulzSec crew came to believe that around half <strong>the</strong> makeup <strong>of</strong> that channel, which anyone could access, was a mixture <strong>of</strong> spies from enemy<br />

groups like Jester’s and Feds. In <strong>the</strong>ir new, public #LulzSec chat room on 2600, <strong>the</strong> crew were disguised by <strong>the</strong>ir maritime-related names:<br />

Whirlpool for Topiary, Kraken for Kayla, and Seabed for Sabu.<br />

As Sabu observed <strong>the</strong>se developments, he grew concerned that <strong>the</strong> crew was getting too excited about having fun on <strong>the</strong> 2600 network—a<br />

place <strong>the</strong>y had attacked but where <strong>the</strong>y had also set up <strong>the</strong>ir own public meeting room. It was impossible to distinguish <strong>the</strong> real fans from <strong>the</strong><br />

spies who wanted to manipulate <strong>the</strong> crew for information and access. At one point it looked like Kayla had gone back into Santa Claus mode<br />

and <strong>of</strong>fered some stolen voucher codes from Amazon to someone outside <strong>the</strong> crew. When Sabu found out about <strong>the</strong> conversation, Kayla<br />

explained that she had merely given someone a few <strong>of</strong> <strong>the</strong> coupons so <strong>the</strong>y could be tested and eventually sold on <strong>the</strong> black market. Sabu,<br />

who was already wary <strong>of</strong> Kayla’s connection to Laurelai, was perturbed.<br />

“Ok guys,” he suddenly said. “I don’t have to say this more than once I hope. But people on 2600 <strong>are</strong> not your friends. 95% <strong>are</strong> <strong>the</strong>re to<br />

social engineer you. To analyze how you talk and make connections. Don’t go <strong>of</strong>f and befriend any <strong>of</strong> <strong>the</strong>m.”<br />

He didn’t mind that <strong>the</strong> reprimand pierced <strong>the</strong> ligh<strong>the</strong>arted atmosphere. Four o<strong>the</strong>r secondary-crew members quickly insisted that <strong>the</strong>y were<br />

being c<strong>are</strong>ful about hiding <strong>the</strong>ir identities, doing so by speaking in broken English so <strong>the</strong>y would appear to be foreign. But Sabu added that if<br />

anyone gave <strong>the</strong>m private info, <strong>the</strong>y should log it and show it to <strong>the</strong> team. If <strong>the</strong>y were sent a link, look at it from a secure connection.<br />

“Be smart about shit,” he concluded. “If any <strong>of</strong> you get owned, I’ll LOL.”<br />

Kayla <strong>the</strong>n piped up, as if she wanted to show <strong>the</strong> o<strong>the</strong>rs that she was on <strong>the</strong> same page with Sabu. “Ano<strong>the</strong>r protip,” she said. “Even if<br />

you <strong>are</strong> American, don’t spell it ‘color,’ use ‘colour,’ which is wider used around <strong>the</strong> <strong>world</strong>. Just saying ‘color’ means you <strong>are</strong> American.”<br />

Sabu didn’t seem to be listening and gave Kayla a new order. He wanted her to change <strong>the</strong> topic <strong>of</strong> <strong>the</strong> public #LulzSec chat room to say<br />

that anyone with 0days and leaks should message her new pseudonym in <strong>the</strong> channel.<br />

“Make sure we take advantage <strong>of</strong> that,” he said. “See what niggers got access to.” Kayla signed out. Sabu enjoyed <strong>the</strong> banter that took<br />

place in #pure-elite between <strong>the</strong> organizational talk, but he was constantly reminding <strong>the</strong> group to stay focused on finding new exploits and<br />

keeping <strong>the</strong> group as tight-knit as possible. It made for a tense atmosphere, but it was necessary. The team’s pr<strong>of</strong>ile was rising faster than <strong>the</strong>y<br />

had ever expected. Googling <strong>the</strong> name LulzSec on June 1 had yielded twenty-five thousand mentions on <strong>the</strong> Internet. In less than twenty-four<br />

hours, that number had risen to two hundred thousand.<br />

Chapter 20<br />

More Sony, More Hackers<br />

By <strong>the</strong> first <strong>of</strong> June, <strong>the</strong> LulzSec team and its associates had ga<strong>the</strong>red a long list <strong>of</strong> vulnerabilities found by team members like Kayla,<br />

Pwnsauce, and Sabu. None were stored on an <strong>of</strong>ficial group document since that was too risky—instead, whoever found a vulnerability kept<br />

it on his or her own computer and sh<strong>are</strong>d it with <strong>the</strong> group when needed. Here LulzSec was setting itself apart from Anonymous, not just<br />

because it was picking media companies but because <strong>of</strong> its focus on stealing data. HBGary had shown that stealing and selectively leaking<br />

data could be far more damaging—and “lulz-worthy” with all <strong>the</strong> attention it was getting—than a straightforward DDoS attack.<br />

When <strong>the</strong> team found a vulnerability, <strong>the</strong> hope was that it would lead to critical secret data <strong>the</strong>y could publish. Often following up a lead<br />

would happen spontaneously. Kayla had found <strong>the</strong> PBS security hole earlier in May, but <strong>the</strong> group had only followed it up because <strong>of</strong> <strong>the</strong><br />

WikiSecrets documentary. Finding <strong>the</strong> security hole was one thing, but exploiting it took more work, and <strong>the</strong>y would have to have a good<br />

reason to turn it into an operation. With one vulnerability <strong>the</strong>y had recently found, though, <strong>the</strong> target company itself was reason enough.<br />

Sony’s lawsuit against George Hotz in April, <strong>the</strong> resultant DDoS attack from Anonymous, and <strong>the</strong> devastating data <strong>the</strong>ft by a small group<br />

<strong>of</strong> black hat <strong>hacker</strong>s had snowballed into a new craze among <strong>hacker</strong>s to hit Sony in any way possible. It meant that Sony had become<br />

something <strong>of</strong> a piñata for <strong>hacker</strong>s. Partly <strong>the</strong> black hats found it funny to keep hitting <strong>the</strong> company over and over, and partly <strong>the</strong>y believed<br />

Sony deserved it for waiting two weeks after <strong>the</strong> original data breach had been discovered before reporting it.<br />

The PBS heist was finished, and <strong>the</strong> 2600 network was still smoldering from <strong>the</strong> attack, but Sabu and Topiary were now knee-deep in<br />

organizing data stolen from Sony’s servers: hundreds <strong>of</strong> thousands <strong>of</strong> users, administrators, internal upcoming albums releases from Sony,<br />

along with 3.5 million music coupons. Three weeks prior, <strong>the</strong> group had been poking around looking for vulnerabilities in Sony websites,<br />

finding and publishing <strong>the</strong> security vulnerabilities in <strong>the</strong> website <strong>of</strong> Sony Japan but also looking at Sony’s Hong Kong site and o<strong>the</strong>rs.<br />

Whenever someone found a vulnerability, he would paste <strong>the</strong> web address in his private chat room, and someone else would go into <strong>the</strong><br />

source code to see how it could be exploited. There was no order to this; people simply contributed when <strong>the</strong>y were around.<br />

Just for <strong>the</strong> heck <strong>of</strong> it, Sabu checked SonyPictures.com, <strong>the</strong> main website for Sony’s $7.2 billion film and television franchise. To his<br />

astonishment, <strong>the</strong>re was a gaping hole in <strong>the</strong> innocuous Ghostbusters page that left <strong>the</strong> network wide open, once again, to a simple SQL<br />

injection attack.<br />

“Hey guys, we need to dump all this now,” he said excitedly. He rushed to map out <strong>the</strong> <strong>are</strong>a and ga<strong>the</strong>r everyone toge<strong>the</strong>r so <strong>the</strong>y could<br />

start taking different sections. “<strong>We</strong>’ve owned something big here. Sony <strong>are</strong> going to crash and burn.”<br />

When <strong>the</strong> group entered <strong>the</strong> network <strong>the</strong>y found a massive vault <strong>of</strong> information. It took a while to make sense <strong>of</strong> <strong>the</strong> data, but soon <strong>the</strong>y<br />

had found a database with two hundred thousand users.<br />

More shocking was that all <strong>of</strong> <strong>the</strong> data, including passwords, were stored in plaintext. The only encrypted passwords were those <strong>of</strong> server<br />

admins, and <strong>the</strong> team managed to crack those anyway.<br />

It was a damning indictment <strong>of</strong> Sony’s security, just weeks after <strong>the</strong> big PlayStation Network data breach. Small schools and charities had<br />

better database encryption than Sony. In fact, by this time, rumor had it that <strong>the</strong> PlayStation Network had been hacked because a disgruntled

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!