ThisisBigBrother.com - UK TV Forums

ThisisBigBrother.com - UK TV Forums (https://www.thisisbigbrother.com/forums/index.php)
-   General Chat (https://www.thisisbigbrother.com/forums/forumdisplay.php?f=8)
-   -   Lulzsec hacker, Ryan Cleary charged under Computer Misuse act (https://www.thisisbigbrother.com/forums/showthread.php?t=177638)

Scarlett. 18-06-2011 09:33 PM

Lulzsec hacker, Ryan Cleary charged under Computer Misuse act
 
http://lulzsecexposed.blogspot.com/

This is their motto
"Web Ninjas" in Action - Bringing Lulz to hack victims

:joker:

Patrick 18-06-2011 09:49 PM

http://www.parisobdan.com/wp-content...t-warcraft.jpg

Scarlett. 19-06-2011 10:39 AM

Apparently Lulzsec's IRC channels have gone deathly silent, looks like the game is finally up

Scarlett. 19-06-2011 02:14 PM

Update: Lulzsec are still all quiet on their Twitter ect. and some

and some ex-FBI Cyber Agent bloke has Tweeted this

http://hitechanalogy.com/wp-content/.../Untitled1.jpg

Redway 19-06-2011 02:21 PM

Lol. :D

Scarlett. 19-06-2011 02:23 PM

It was about time they were exposed, though, they have highlighted the importance of internet security, and perhaps now big companies will employ new tactics to keep users safe

Scarlett. 20-06-2011 08:56 PM

S.O.C.A, is their first target, **** knows why, these are the guys who help prevent terrorism, but I guess Lulzsec just follow the misconception that they are the UK FBI...


The UK Serious Organised Crime agency has taken its website offline after it appeared to be a victim of an attack by hacking group Lulz Security.

Soca said it had taken its website offline to limit the impact attack on clients hosted by its service provider.

Soca.gov.uk had been unavailable for much of Monday afternoon, with an intermittent service restored later.

Lulz Security has said it was behind the denial of service attack which had taken the website offline.

Earlier on Monday, as the agency launched an investigation, LulzSec tweeted: "Tango down - in the name of #AntiSec".

The group has hit a number of high-profile websites in recent weeks, including the CIA and US Senate.

Soca appeared to be the victim of a distributed denial of service (DDoS) attack, where large numbers of computers, under malicious control, overload their target with web requests.

In a statement given to BBC News, a Soca spokesman said: "Soca has chosen to take its website offline to limit the impact of DDOS attack on other clients hosted by our service provider.

"The Soca website is a source of information for the general public which is hosted by an external provider. It is not linked to our operational material or the data we hold."
Embarrassment

Earlier on Monday, a LulzSec Twitter posting seemed to confirm the nature of the attack.

"DDoS is of course our least powerful and most abundant ammunition. Government hacking is taking place right now behind the scenes," it said.

The latest attack will come as an embarrassment for Soca, which is tasked with investigating cybercrime.

"It is not going to please the boys in blue one bit," said Graham Cluley, senior technology consultant at security firm Sophos.
Continue reading the main story
Lulz Security attacks

May 7: US X Factor contestant database
May 10: Fox.com user passwords
May 15: Database listing locations of UK cash machines
May 23: Sonymusic Japan website
May 30: US broadcaster PBS. Staff logon information
June 2: Sonypictures.com user information
June 3: Infragard website (FBI affiliated organisation)
June 3: Nintendo.com
June 10: Pron.com pornographic website
June 13: Senate.gov - website of US Senate
June 13: Bethesda software website. User information
June 14: EVE Online, League of Legends, The Escapist and others

Mr Cluley added that it was wrong to confuse DDoS with the kind of hacking that can lead to confidential information being stolen.

However, he warned that LulzSec was capable of both types of attack.

"They have in the past broken into websites and stolen e-mail addresses and passwords, so there is a lot of harm can be done."
Big Lulz

When Lulz Security first appeared in May, the group portrayed itself as a light-hearted organisation, bent on creating online fun and Lulz (laughs).

Soon after, details of its hacking exploits began to emerge.

The first involved stealing and publishing a database of US X-Factor contestants, including their e-mail addresses and phone numbers.

It followed up with a mixture of website denial of service attacks and intrusions where data was taken and made available on the internet.

On June 19, LulzSec declared that it would begin targeting government systems, calling the campaign Antisec.

"Top priority is to steal and leak any classified government information, including e-mail spools and documentation. Prime targets are banks and other high-ranking establishments," said a post on the group's website.

The reason for LulzSec's greater focus on government is unclear, although it appears to have recently ended a feud with the more politically-motivated group Anonymous.

BBC News

Scarlett. 20-06-2011 08:56 PM

S.O.C.A, is their first target, **** knows why, these are the guys who help prevent terrorism, but I guess Lulzsec just follow the misconception that they are the UK FBI...


The UK Serious Organised Crime agency has taken its website offline after it appeared to be a victim of an attack by hacking group Lulz Security.

Soca said it had taken its website offline to limit the impact attack on clients hosted by its service provider.

Soca.gov.uk had been unavailable for much of Monday afternoon, with an intermittent service restored later.

Lulz Security has said it was behind the denial of service attack which had taken the website offline.

Earlier on Monday, as the agency launched an investigation, LulzSec tweeted: "Tango down - in the name of #AntiSec".

The group has hit a number of high-profile websites in recent weeks, including the CIA and US Senate.

Soca appeared to be the victim of a distributed denial of service (DDoS) attack, where large numbers of computers, under malicious control, overload their target with web requests.

In a statement given to BBC News, a Soca spokesman said: "Soca has chosen to take its website offline to limit the impact of DDOS attack on other clients hosted by our service provider.

"The Soca website is a source of information for the general public which is hosted by an external provider. It is not linked to our operational material or the data we hold."
Embarrassment

Earlier on Monday, a LulzSec Twitter posting seemed to confirm the nature of the attack.

"DDoS is of course our least powerful and most abundant ammunition. Government hacking is taking place right now behind the scenes," it said.

The latest attack will come as an embarrassment for Soca, which is tasked with investigating cybercrime.

"It is not going to please the boys in blue one bit," said Graham Cluley, senior technology consultant at security firm Sophos.
Continue reading the main story
Lulz Security attacks

May 7: US X Factor contestant database
May 10: Fox.com user passwords
May 15: Database listing locations of UK cash machines
May 23: Sonymusic Japan website
May 30: US broadcaster PBS. Staff logon information
June 2: Sonypictures.com user information
June 3: Infragard website (FBI affiliated organisation)
June 3: Nintendo.com
June 10: Pron.com pornographic website
June 13: Senate.gov - website of US Senate
June 13: Bethesda software website. User information
June 14: EVE Online, League of Legends, The Escapist and others

Mr Cluley added that it was wrong to confuse DDoS with the kind of hacking that can lead to confidential information being stolen.

However, he warned that LulzSec was capable of both types of attack.

"They have in the past broken into websites and stolen e-mail addresses and passwords, so there is a lot of harm can be done."
Big Lulz

When Lulz Security first appeared in May, the group portrayed itself as a light-hearted organisation, bent on creating online fun and Lulz (laughs).

Soon after, details of its hacking exploits began to emerge.

The first involved stealing and publishing a database of US X-Factor contestants, including their e-mail addresses and phone numbers.

It followed up with a mixture of website denial of service attacks and intrusions where data was taken and made available on the internet.

On June 19, LulzSec declared that it would begin targeting government systems, calling the campaign Antisec.

"Top priority is to steal and leak any classified government information, including e-mail spools and documentation. Prime targets are banks and other high-ranking establishments," said a post on the group's website.

The reason for LulzSec's greater focus on government is unclear, although it appears to have recently ended a feud with the more politically-motivated group Anonymous.

BBC News

Scarlett. 21-06-2011 11:25 AM

A 19-year-old suspected of being a mastermind behind notorious international computer hacking group LulzSec has been arrested in Essex, after a joint operation by the FBI and Scotland Yard.

It comes just days after the group claimed it brought down the US Central Intelligence Agency's website.

The alleged hack on CIA.gov occurred on the same day the group opened a telephone request line so its fans could suggest potential targets.

On Twitter, the group wrote: "Tango down - CIA.gov - for the lulz".

More to follow
http://news.sky.com/skynews/Home/UK-...rmind_Arrested

Scarlett. 21-06-2011 12:11 PM

Official Press Release

Quote:

Officers from the Metropolitan Police Central e-Crime Unit (PCeU) have arrested a 19-year-old man in a pre-planned intelligence-led operation.

The arrest follows an investigation into network intrusions and Distributed Denial of Service (DDoS) attacks against a number of international business and intelligence agencies by what is believed to be the same hacking group.

The teenager was arrested on suspicion of Computer Misuse Act, and Fraud Act offences and was taken to a central London police station, where he currently remains in custody for questioning.

Searches at a residential address in Wickford, Essex, following the arrest last night have led to the examination of a significant amount of material. These forensic examinations remain ongoing.

The PCeU was assisted by officers from Essex Police and have been working in co-operation with the FBI.

BBfanUSA 21-06-2011 01:14 PM

Good and darn I wish that they hacked xbox live so they would have to do a welcome back program. I would love to have halo for free

arista 21-06-2011 01:53 PM

http://www.dailymail.co.uk/sciencete...le-attack.html

Scarlett. 21-06-2011 08:26 PM

Turns out the dude who was arrested isn't that big of a member, though I suspect there might have been a plan to arresting him. In other news

Quote:

Lulzsec: We decided to unleash the kraken on two jackasses: http://pastebin.com/MBEsm5XQ

Lulzsec: tl;dr they leaked logs, we owned them, one of them literally started crying for mercy, we saw it fit to pastebin their home addresses.

Lulzsec: Remember this tweet, m_nerva, for I know you'll read it: your cold jail cell will be haunted with our endless laughter. Game over, child.

Shaun 21-06-2011 08:27 PM

what a sad little community lulzsec are.

Scarlett. 21-06-2011 08:29 PM

Couldn't agree more, then again them and anonymous came from the cesspit that is 4chan, so it's no surprise

arista 21-06-2011 09:07 PM

http://news.sky.com/sky-news/content...3/16016381.jpg

MTVN 21-06-2011 09:09 PM

What are they actually trying to do, just hack things for the sake of it?

Scarlett. 21-06-2011 09:33 PM

Quote:

Originally Posted by MTVN (Post 4320028)
What are they actually trying to do, just hack things for the sake of it?

"For the lulz" which would be fine, if they didn't insist on leaking the public's information. Though they're now extending into Anonymous' anarchist crap

arista 22-06-2011 07:50 AM

They are saying he also hacked Sony.


http://i.dailymail.co.uk/i/pix/2011/...05_308x439.jpg


A 19 year old sent to his room 2 years back.


It is Good the UK Police arrested him
and the FBI have every right to get their crimes
dealt with before this Punk is sent away.


http://i.dailymail.co.uk/i/pix/2011/...75_634x415.jpg
His Criminal Den.
Complete with Evil Cat


"Worry: Ryan's mother, Rita (right), said her son rarely left his bedroom. 'He's a complete recluse, he would only come out of his room to use the bathroom"

Read more: http://www.dailymail.co.uk/sciencete...#ixzz1PzOZg1ry

InOne 22-06-2011 08:12 AM

Poor cat :joker:

AJ. 22-06-2011 09:08 AM

Quote:

"Ryan, described as a loner who ‘lives his life online’, faces the prospect of extradition to the U.S. where he could face 60 years behind bars for allegedly hacking into the CIA and Senate websites."
Yeah that seems fair, serial killers get less :rolleyes:

MTVN 22-06-2011 09:40 AM

Yeah the sentences for things like this are ridiculous, it's like that case a couple of years ago with that guy who hacked into some US military computers, didnt really do anything and could face 70 years in jail, it's a joke

AJ. 22-06-2011 09:44 AM

Quote:

Originally Posted by MTVN (Post 4320874)
Yeah the sentences for things like this are ridiculous, it's like that case a couple of years ago with that guy who hacked into some US military computers, didnt really do anything and could face 70 years in jail, it's a joke

Yeah he was looking for UFO files or something :joker: wasn't he's slighty mentally disabled aswel? & they was thinking about the death sentance, scary.

arista 22-06-2011 09:53 AM

He is Guilty
of hacking including Sony Corp.


His mum left his dinner outside his Den
he was left to be a criminal Online.

MTVN 22-06-2011 10:19 AM

Quote:

Originally Posted by DeejayAJ (Post 4320876)
Yeah he was looking for UFO files or something :joker: wasn't he's slighty mentally disabled aswel? & they was thinking about the death sentance, scary.

Haha yeah he thought they were covering it up, and that they were suppressing free energy from becoming available or something :laugh: I think he was diagnosed with autism, or maybe it was something more serious, not too sure


All times are GMT. The time now is 10:27 AM.

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2025, vBulletin Solutions Inc.
User Alert System provided by Advanced User Tagging (Pro) - vBulletin Mods & Addons Copyright © 2025 DragonByte Technologies Ltd.