31.10.2012 Views

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

We are anonymous inside the hacker world of lulzse

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

twenty-six thousand porn passwords, he got replies from people on Twitter saying <strong>the</strong>y had used <strong>the</strong> data dump to hack into o<strong>the</strong>r people’s emails<br />

or, in one case, find out a guy was “cheating on his girlfriend.”<br />

Topiary realized he could start making things more interactive. He could send a hundred thousand people to a YouTube video and grant<br />

<strong>the</strong> account holder a huge increase in views, or he could send <strong>the</strong> horde to crash a small website or IRC network. LulzSec’s attacks would<br />

become a lot more fun. He and Ryan started talking and doing some prank calls on Skype with some <strong>of</strong> Ryan’s friends as an audience. Then<br />

Ryan set <strong>the</strong>m up with a joint Skype Unlimited account so <strong>the</strong>y could call anywhere in <strong>the</strong> <strong>world</strong>, dropping eighty dollars in credit without<br />

blinking an eye.<br />

Topiary had an idea. Instead <strong>of</strong> making prank calls, what if <strong>the</strong>y got LulzSec’s Twitter followers to call <strong>the</strong>m? Topiary suggested setting<br />

up a Google Voice number so that anyone in <strong>the</strong> <strong>world</strong> could call LulzSec (or at least himself). He wanted <strong>the</strong> number to spell out <strong>the</strong><br />

group’s name, as in 1-800-LULZSEC, but he couldn’t find an <strong>are</strong>a code where <strong>the</strong> number would work. Eager to prove himself, Ryan spent<br />

hours going through every possible U.S. number till he found that 614, <strong>the</strong> <strong>are</strong>a code for Columbus, Ohio, was available with <strong>the</strong><br />

corresponding digits. They now had a telephone hotline: 1-614-LULZSEC.<br />

It was a free Google number that directed to <strong>the</strong>ir new Skype Unlimited-World-Extra number that in turn could bypass to two o<strong>the</strong>r<br />

potential numbers registered to fake IP addresses. The pair created two voice-mail messages, using voice alteration and over-<strong>the</strong>-top French<br />

accents for <strong>the</strong> fictional names Pierre Dubois and Francois Deluxe, saying <strong>the</strong>y couldn’t come to <strong>the</strong> phone because “<strong>We</strong> <strong>are</strong> busy raping<br />

your Internets.”<br />

Once Topiary announced <strong>the</strong> hotline on LulzSec’s public chat room, <strong>the</strong>y got several calls a minute; <strong>the</strong>y answered a few and joked with<br />

<strong>the</strong>ir callers. Without giving any hints, Topiary stated <strong>the</strong>re would be a $1,000 prize for anyone who called in with <strong>the</strong> magic word<br />

—lemonade—but nobody guessed correctly, and around forty people thought it was please. At <strong>the</strong> end <strong>of</strong> <strong>the</strong> day <strong>the</strong>y’d received 450 calls.<br />

In between fielding calls, Topiary wrote up an announcement <strong>of</strong> <strong>the</strong> group’s latest drop: a directory listing <strong>of</strong> every single file on <strong>the</strong> U.S.<br />

Senate’s web server, which had come to <strong>the</strong>m thanks to ano<strong>the</strong>r black hat. This was a serious attack that could earn someone five to twenty<br />

years in prison, but Topiary was mostly eager to get back to his LulzSec hotline.<br />

“This is a small, just-for-kicks release <strong>of</strong> some internal data from Senate.gov,” Topiary had written. “Is this an act <strong>of</strong> war, gentlemen?<br />

Problem?”<br />

Along with that release was a dump <strong>of</strong> <strong>the</strong> source code and database passwords <strong>of</strong> <strong>the</strong> gaming company Be<strong>the</strong>sda—a topic totally<br />

unrelated to <strong>the</strong> Senate, just one <strong>of</strong> <strong>the</strong> leaks <strong>the</strong>y were sitting on. They also had a database <strong>of</strong> two hundred thousand users stored on <strong>the</strong><br />

servers <strong>of</strong> gaming company Brink, but <strong>the</strong>y wouldn’t release that because “<strong>We</strong> actually like this company and would like for <strong>the</strong>m to speed<br />

up <strong>the</strong> production <strong>of</strong> Skyrim. You’re welcome!” At <strong>the</strong> top <strong>of</strong> each release was now a short list <strong>of</strong> contact and donation details for LulzSec,<br />

including <strong>the</strong> telephone hotline and <strong>the</strong> IRC chat room.<br />

“It is unclear why LulzSec decided to attempt to embarrass yet ano<strong>the</strong>r video game company o<strong>the</strong>r than to show <strong>of</strong>f,” said Naked Security<br />

journalist Chester Wisniewski. “It is difficult to explain random acts <strong>of</strong> sabotage and defacement, so I am not going to attempt to get into <strong>the</strong><br />

heads <strong>of</strong> those behind <strong>the</strong>se attacks.” Yet this was not a matter <strong>of</strong> motivation, but <strong>of</strong> circumstance. Back when Kayla had used her botnet to<br />

scan <strong>the</strong> <strong>We</strong>b for vulnerabilities, hooking it up to an IRC channel and using basic chat commands to run it, she had stumbled on a<br />

vulnerability in <strong>the</strong> network <strong>of</strong> Be<strong>the</strong>sda that had given her access to its servers. Since <strong>the</strong> company was so big, <strong>the</strong> team chose not to root<br />

around for databases right away, using Be<strong>the</strong>sda’s bandwidth to help search for o<strong>the</strong>r sites to hack into and using it as a safe location to hide<br />

bots. The gaming company had no idea it was effectively being used to hack o<strong>the</strong>r sites. When <strong>the</strong> servers outlived <strong>the</strong>ir usefulness, it was<br />

time to dump <strong>the</strong> data stored on <strong>the</strong>m.<br />

Now <strong>the</strong> hacks were about to get even more arbitrary. Knowing that Ryan’s botnet could take out anything, Topiary announced <strong>the</strong><br />

LulzSec hotline on Twitter and told <strong>the</strong> public: “Pick a target and we’ll obliterate it.” The hotline was suddenly inundated with calls, and <strong>the</strong><br />

three people that initially got through all requested gaming companies: Eve, Minecraft, and League <strong>of</strong> Legends.<br />

Within minutes, Ryan’s botnet had hit all three, as well as a site called FinFisher.com, “because app<strong>are</strong>ntly <strong>the</strong>y sell monitoring s<strong>of</strong>tw<strong>are</strong> to<br />

<strong>the</strong> government or some shit like that.” DDoSing sites like this was nothing new, and nei<strong>the</strong>r was one or two hours <strong>of</strong> downtime, but it was<br />

<strong>the</strong> first time anyone had boasted about it to a hundred fifty thousand Twitter followers or referred to it as a DDoS party called Titanic<br />

Takeover Tuesday.<br />

“If you’re mad about Minecraft, we’d love to laugh at you over <strong>the</strong> phone,” Topiary announced. “Call 614-LULZSEC for your chance to<br />

reach Pierre Dubois!”<br />

When Topiary started thinking about <strong>the</strong> Internet meme phrase “How do magnets work?” made famous by <strong>the</strong> hip-hop duo Insane Clown<br />

Posse, he called up <strong>the</strong> <strong>of</strong>fices at Magnets.com. He asked <strong>the</strong> woman who answered that question and got a bemused response, hung up, <strong>the</strong>n<br />

redirected <strong>the</strong> LulzSec hotline to <strong>the</strong> main switchboard <strong>of</strong> Magnets.com.<br />

“Everyone call 614-LULZSEC for a fun surprise,” he tweeted. About three minutes later he called <strong>the</strong> number again and heard dozens <strong>of</strong><br />

phones going <strong>of</strong>f at <strong>the</strong> same time with answers <strong>of</strong> “This is Magnets.com…Uh…” He asked to speak to a manager. When a man’s voice<br />

came on, Topiary explained <strong>the</strong> reason for <strong>the</strong> flood <strong>of</strong> strange calls. To his credit, <strong>the</strong> manager took it in good humor.<br />

“How did you do it?” he asked.<br />

“<strong>We</strong>’re testing out our new Lulz Phone Cannon,” Topiary said. “How <strong>are</strong> you feeling?”<br />

“I’m a little out <strong>of</strong> breath.” Magnets.com had been getting more than two hundred calls a minute to <strong>the</strong>ir customer support center.<br />

“Okay, I’ll get it to stop,” Topiary said.<br />

“Good, because I feel like I’m about to pass out.”<br />

With a few clicks he stopped <strong>the</strong> hotline from redirecting, and he heard all <strong>the</strong> phones in <strong>the</strong> background suddenly go silent. It was like a<br />

DDoS attack by telephone. It made sense to keep this going. Soon he was redirecting <strong>the</strong> LulzSec hotline to <strong>the</strong> World <strong>of</strong> Warcraft online<br />

game, <strong>the</strong>n to <strong>the</strong> main switchboard for FBI Detroit, and <strong>the</strong>n, naturally, to <strong>the</strong> <strong>of</strong>fices <strong>of</strong> HBGary Inc.<br />

“You take c<strong>are</strong> <strong>of</strong> <strong>the</strong> horde while we’re gone, AaronBarr,” Topiary tweeted to its former executive. “Thanks mate. Bye for now.” In <strong>the</strong><br />

next twenty-four hours, in between his talking with <strong>the</strong> o<strong>the</strong>r LulzSec <strong>hacker</strong>s and manning a Twitter feed, Topiary’s busy switchboard had<br />

received 3,500 missed calls and 1,500 voice mails; <strong>the</strong> following day, 5,000 missed calls and 2,500 voice mails.<br />

Soon, though, Ryan started to get restless. He wanted to do more than just play around with hotline callers; he wanted to go back to hitting<br />

websites, bigger ones. He had a rapt audience now, and a gang <strong>of</strong> people who were willing to go after <strong>the</strong> big names under this banner <strong>of</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!