31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

“Just looked at this guy’s source for ‘sonydev.net,’” he said. “It seems ligit. php file etc. Still investigating.”<br />

“Neuron, that source you got,” said Sabu. “[Post it on] pastee.org so we can analyze also.” Neuron sent <strong>the</strong> o<strong>the</strong>rs a link to <strong>the</strong> fifty-fivemegabyte<br />

file along with a thirty-three-digit password to access it.<br />

“Downloading,” said Sabu. “Which site is this for? Sonydev.net?”<br />

“Aye,” said Neuron. “I’m sure we can find <strong>the</strong> pass somewhere on Sony.”<br />

“Analyzing ‘scedev’ source codes now,” said Sabu. Neuron checked in about ten minutes later.<br />

“What’s <strong>the</strong> word on that source?” Neuron asked.<br />

Sabu seemed to approve <strong>of</strong> it. “Should we just leak <strong>the</strong> source code?” he asked Topiary and Neuron.<br />

“I wouldn’t suggest it just yet,” Neuron replied. “<strong>We</strong> could use more <strong>of</strong> his shit. He’s a Sony developer.”<br />

“You serious?” asked Sabu.<br />

“If we keep quiet we can get more,” said Neuron, who took <strong>the</strong> view that it was better to lurk than dump everything at once like a script<br />

kiddie.<br />

“So tell him to give us access into [<strong>the</strong>] Sony network.”<br />

“I’ll see. He said he was an ex-Sony developer but has access.”<br />

“Social engineer him into that shit,” said Storm, who was listening in.<br />

“Ok,” said Sabu. “So bro. What <strong>are</strong> you doing here talking to us? Social his ass. Haha.” Neuron had gone to try to talk to <strong>the</strong> source again<br />

but it was already too late.<br />

“He logged <strong>of</strong>f,” said Neuron.<br />

“Gay,” Sabu said, a little disappointed. “So he messaged you, gave you source, logged <strong>of</strong>f?”<br />

“Yeah,” said Neuron. “He likes us or something.”<br />

This was how it <strong>of</strong>ten went. The promise <strong>of</strong> leaks and exploits would come from gray and black hat <strong>hacker</strong>s or anyone who had something<br />

worth <strong>of</strong>fering. Often <strong>the</strong> data wasn’t as exciting as originally promised, but in <strong>the</strong> end, <strong>the</strong> team used <strong>the</strong> source code that <strong>the</strong> ex–Sony<br />

developer had passed <strong>the</strong>m. And over time <strong>the</strong>y stopped being surprised that so many outside people wanted to pass <strong>the</strong>m vulnerabilities to<br />

exploit—it seemed like everyone in <strong>the</strong> IT security field, itself a medley <strong>of</strong> white hats with a darker past, was talking about LulzSec. A few<br />

secretly wished <strong>the</strong>y could be a part <strong>of</strong> <strong>the</strong> fun.<br />

One <strong>hacker</strong> had a particularly unusual way <strong>of</strong> demanding to be let in. One afternoon, <strong>the</strong> LulzSec crew found <strong>the</strong>mselves getting<br />

individually kicked out <strong>of</strong> <strong>the</strong> public LulzSec chat room.<br />

“Wow, bro,” Storm suddenly said on #pure-elite. “People <strong>are</strong> trying to down our ops.” Someone was sending junk packets and bumping<br />

each LulzSec crew member <strong>of</strong>f <strong>the</strong> IRC channel. It wasn’t affecting <strong>the</strong>ir computers, but <strong>the</strong> virtual machines or virtual private networks<br />

being used to displace <strong>the</strong>ir true locations were getting hit. DDoSing someone’s IP could make him disappear from <strong>the</strong> Internet for a while,<br />

but if you did it enough he’d be booted from his hosting service altoge<strong>the</strong>r.<br />

“<strong>We</strong> gotta get <strong>of</strong>f that server,” said a second-tier member called Recursion.<br />

“<strong>We</strong>’re getting hit,” cried Neuron. There was a general hubbub among <strong>the</strong> secondary crew as <strong>the</strong>y floundered over a response to <strong>the</strong><br />

attack.<br />

Sabu almost rolled his eyes. “Neuron, so sign <strong>of</strong>f? Look guys.” No one was listening.<br />

“The whole room is hit,” Storm exclaimed. “He’s hitting random people.” It seemed a lone mercenary who went by <strong>the</strong> nickname Xxxx<br />

was trying to disrupt LulzSec’s attempts to meet with its fans.<br />

Then Joepie received a private message: “Hi Kayla or Sabu or Tflow.” It had come from Xxxx. Joepie ran a search on <strong>the</strong> user’s IP and<br />

realized it was Ryan, <strong>the</strong> botnet-wielding temperamental operator from AnonOps.<br />

Neuron received <strong>the</strong> same private message, <strong>the</strong>n o<strong>the</strong>rs in <strong>the</strong> secondary crew did too.<br />

“Everybody shut <strong>the</strong> fuck up,” Sabu said. People were still talking excitedly. “EVERYONE. SHUT THE FUCK UP.” That seemed to<br />

get <strong>the</strong>ir attention.<br />

“Relax,” he continued. “As for Ryan, ignore him. He doesn’t know it’s us. Jesus.”<br />

“Relax,” said Joepie, adding a smiley face.<br />

“Ryan, huh?” said Topiary.<br />

“The situation is getting horribly stressing,” said Trollpoll.<br />

“I know, Jesus,” said Sabu. “Look. From now on, no one goes on 2600 unless you prep yourself for <strong>the</strong> social engineering.”<br />

Everyone was listening now. “If you don’t know how to social engineer do not get on 2600,” he said. “If you do not have a DDoS<br />

protected IP, do not get on 2600. That’s it.”<br />

“Aye,” said Neuron.<br />

“Exactly,” said Storm.<br />

“Aye-aye, Storm,” said Recursion. “Err, Sabu. I meant to say aye-aye Sabu, not Storm.”<br />

“Ok,” said Sabu. “Sony was leaked. <strong>We</strong> got bigger projects.” He pointed to Neuron’s work on <strong>the</strong> new Sony development source code.<br />

“How about those who <strong>are</strong> not too busy work on auditing that source code.” Everyone got back to work.<br />

Chapter 21<br />

Stress and Betrayal<br />

As LulzSec’s targets got bigger, Kayla started drifting away a little from operations, more interested in taking revenge on enemies like Jester

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!