From Wikipedia, the free encyclopedia

Operation Anti-Security, also referred to as Operation AntiSec, is a series of hacking attacks performed by members of now-defunct hacking group LulzSec, the group Anonymous, and others inspired by the announcement of the operation.

Background

The LulzSec hacking group formed on 15 May 2011 and came to national prominence after hacking the websites of the Public Broadcasting Service, Sony, and the United States Senate. [1] [2] Initially, the group claimed to hack "for the lulz" and to enjoy the chaos that follows their intrusions. [3] [4] However, on 20 June 2011, the group announced that they were teaming up with hacking collective Anonymous for a series of attacks they dubbed Operation Anti-Security or Operation AntiSec. The press release accompanying the beginning of the operation called for supporters to steal and publish classified government documents under the name AntiSec. Major banks and corporations were also mentioned as potential targets. [5] Though LulzSec disbanded as a group on 26 June 2011, members have been reported to be continuing the operation from within Anonymous. [6] [7]

The groups involved claim that the operation aims to protest government censorship and monitoring of the internet. [8] LulzSec members also mentions ending what they believe are corrupt racial profiling and copyright laws as a goal of the operation. [9] The War on Drugs has also been given as a reason for particular hacks. [10] In contrast, USA Today described as cyberwarfare targeting governments and large corporations. [11]

LulzSec activities

LulzSec launched the first attacks of the operation against the Serious Organised Crime Agency, the national law enforcement agency of the United Kingdom that handles cybercrime. The group launched a distributed denial-of-service attack against the agency's website on 20 June, taking it offline for only a few minutes. [12] On the same day, they knocked the website of the Jianhua District in Qiqihar, China offline. [13]

On 23 June, the group released a large cache of documents taken from the servers of the Arizona Department of Public Safety. The release, titled "chinga la migra", roughly translating to "fuck the border patrol", including email addresses and passwords and hundreds of documents marked "sensitive" or "for official use only". [14] The group claimed that they did so in retaliation for the passage of Arizona SB 1070, a law they saw as leading to unjust racial profiling. [15] Arizona complained that the release of officer identities and the personal information of their families could put them and their families in danger and gave those exposed security protection. In response, they mobilized the Arizona Counter Terrorism Information Center and locked remote access of Department of Public Safety email accounts. [16]

On 25 June 2011, the group released what they described as their last dump of the operation. The release contained a large amount of information from varied sources. Included was information from numerous companies, including half a gigabyte of data from telecommunications company AT&T and IP addresses from Sony, Viacom, Disney, EMI, and NBC Universal. [17] [18] The AT&T portion included information pertaining to the release of the 4G LTE, 90,000 personal phones used by IBM, and the development of the iPad 3. [18] [19] It also contained over 750,000 usernames and password combinations, including 200,000 from hackforums.net, 12,000 from the NATO online bookstore, 500,000 from the online video game Battlefield Heroes, 50,000 from various video game forums, and 29 from Irish private investigation company Priority Investigations. [18] Finally, an internal manual for AOL engineers and a screencapture of the United States Navy website navy.mil after being vandalized. [18]

On 22 June, an offshoot of the group calling themselves LulzSecBrazil took down the website of the Government of Brazil, brasil.gov.br, and the President of Brazil, presidencia.gov.br. [20] [21] They also targeted the website of Brazilian energy company Petrobras. [22] On 24 June, they claimed to publish access codes and passwords to the Petrobras website along with personnel profiles. However, the company denied that any information had been stolen, and the group removed the claim from their Twitter feed a few hours later. [23] The group also published the personal information of President of Brazil Dilma Rousseff and Mayor of São Paulo Gilberto Kassab. [24]

Anonymous activities

On 27 June 2011, Anonymous published information relating to the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory program, or Sentinel program, an operation run by the United States Department of Homeland Security and Federal Emergency Management Agency. The hack included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of Federal Bureau of Investigation bureau locations, details on counter-hacking tools, and form letters that law enforcement agencies used to obtain user details from internet service providers. [25]

On 28 June, the group released the second collection of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed "Chinga la Migra Communique Dos", or "Fuck the Border Patrol Message Two", the data file contained the names, addresses, phone numbers, internet passwords, and social security numbers of a dozen Arizona police officers. It also contained the emails, voicemails, chat logs of some of them; in at least one instance it included sexually explicit photographs from one of the officer's girlfriends. [26] Anonymous also claimed that the documents included officers forwarding racist chain emails, evidence of K-9 unit officers using percocet, and a Fraternal Order of Police member who is also a convicted sex offender. [26] Anonymous noted that their motivation stemmed from a desire to make police officers "experience just a taste of the same kind of violence and terror they dish out on an every day basis." [26]

On the same day, the group released information obtained from various government sources. Government data from Anguilla, passwords from servers belonging to the Government of Brazil, the users of Zimbabwe government websites, and data from the Municipality of Mosman council were included. [27] The Mosman council dump included mainly publicly available information from the website as well as a not-publicly-available prototype version of the website that had not yet been launched. [28] They claimed to also have access to all Zimbabwean government websites ending in gov.zw. [27] Most of the information and control were given through SQL injection. Anonymous claimed they targeted Brazil for its what they saw as data manipulation and Zimbabwe for the controversial 2008 Zimbabwean presidential election. [29] They also gained control of a website belonging to the Government of Tunisia. They replaced the webpage with a graphic representing Anonymous with text reading "The Internet is the last frontier and we will not let corrupt governments spoil it. We are Anonymous, We are LulzSec, We are People from around the world who are stepping in the name of freedom". [30] The release also included a file containing internal mapping of Viacom servers as well as passwords and data from umusic.com, a website of Universal Music Group. [29]

On 1 July, Anonymous once again targeted Arizona law enforcement by publishing a number of backdoors that could be used to access Arizona police servers to Pastebin. Arizona was forced to pull many websites offline for a time. [31] Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They also claimed to have found "anti- Muslim" emails during the attack. [32]

On 4 July, Anonymous released a document containing 27 administrative usernames and passwords from an Apple Inc. system used to operate online technical support follow-up surveys. [33] [34] The encrypted passwords were taken from an SQL database. [35]

On 3 July, Anonymous hacked into the database of the Democrat Party of Orange County, Florida. They published a partial membership list and a handbook for precinct committee members. [36]

Actions by other groups and individuals

The original announcement of Operation Anti-Security included a call from LulzSec to spread the name "AntiSec" through physical graffiti. [11] A few days after, a number of locations in Mission Beach, San Diego were vandalized with pieces of graffiti reading the phrase. [37] [38]

On 4 July, the Fox News Twitter feed was hacked and false tweets reporting that President of the United States Barrack Obama has been shot three times and killed were sent from the account. [39] The Script Kiddies, a group with close ties to Anonymous including two hackers with former membership in the group, claimed responsibility for the attack and hoax. The group claimed that the action was in the name of Operation Anti-Security and that they would continue looking to expose information on corporations "to assist with antisec." [40] The United States Secret Service is investigating the incident as a threat on the President. [41]

On 4 July, someone going by the name f1esc posted a file to The Pirate Bay containing 600 megabytes of information described as national "AU election data" and labelled with the tag #Antisec. In reality, the data concerned the 2011 New South Wales state election and was taken from a government website designed to provide election results where the data was publicly available, and the data proved freely accessible information instead of a hack. [42]

References

  1. ^ Morse, Andrew; Sherr, Ian (6 June 2011). "For Some Hackers, The Goal Is Just To Play A Prank". The Wall Street Journal. p. B1. Retrieved 6 June 2011.
  2. ^ Svensson, Peter (2011-06-27). "Parting is such tweet sorrow for hacker group". The Sydney Morning Herald. The Sydney Morning Herald. Retrieved 2011-06-29.
  3. ^ Murphy, David (19 June 2011). "Three Reasons to Fear Lulzsec: Sites, Skills, and Slant". PC Magazine. Ziff Davis. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  4. ^ Taylor, Jerome (16 June 2011). "Who are the group behind this week's CIA hack?". The Independent. London. Independent Print Limited. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  5. ^ Ross, Nick (20 June 2011). "Lulzsec teams up with Anonymous". ABC Online. Australian Broadcasting Corporation. Retrieved 20 June 2011.
  6. ^ Olivarez-Giles, Nathan (29 June 2011). "AntiSec 'hackers without borders' claim new hack on Arizona state police". Los Angeles Times. Los Angeles. Tribune Company. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  7. ^ Weisenthal, Joe (25 June 2011). "Notorious Hacker Group LulzSec Just Announced That It's Finished". Business Insider. Silicon Alley Insider. Archived from the original on 25 June 2011. Retrieved 25 June 2011.
  8. ^ Stevenson, Alastair (22 June 2011). "Operation Anti-Security: Anonymous yet to act while LulzSec rampage". International Business Times. New York City. Archived from the original on 24 June 2011. Retrieved 24 June 2011.
  9. ^ Watts, Susan (24 June 2011). "Newsnight online 'chat' with Lulz Security hacking group". BBC News. London. BBC. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  10. ^ Bright, Peter (25 June 2011). "LulzSec's first Operation Anti-Security release: Arizona DPS". Ars Technica. Condé Nast Publications. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  11. ^ a b Acohido, Byron (20 June 2011). "LulzSec, Anonymous declare war against governments, corporations". USA Today. McLean, Virginia. Gannett Company. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  12. ^ Meyer, David (20 June 2011). "LulzSec claims Soca hack". ZDNet. CBS Interactive. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  13. ^ Ragan, Steve (21 June 2011). "LulzSec and Anonymous: Hunting for skeletons hidden in closets". The Tech Herald. Archived from the original on 21 June 2011. Retrieved 21 June 2011.
  14. ^ Aamoth, Doug (23 June 2011). "LulzSec Claims Breach Against Arizona Law Enforcement". Techland (Time). Retrieved 23 June 2011.
  15. ^ Tsotsis, Alexia (23 June 2011). "LulzSec Releases Arizona Law Enforcement Data In Retaliation For Immigration Law". TechCrunch. Retrieved 23 June 2011.
  16. ^ "DPS Victim of Cyber Attack". Press Releases. Phoenix, Arizona: Arizona Department of Public Safety. 27 June 2011. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  17. ^ Whittaker, Zack (25 June 2011). "LulzSec disbands: Final cache includes AT&T internal data and 750,000 user accounts". ZDNet. CBS Interactive. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  18. ^ a b c d Greenberg, Andy (25 June 2011). "LulzSec Says Goodbye, Dumping NATO, AT&T, Gamer Data". Forbes Magazine. New York City. Forbes. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  19. ^ Sin, Gloria (28 June 2011). "LulzSec leaked AT&T LTE rollout plans and iPad 3 rumor". CNET. CBS Interactive. Archived from the original on 4 July 2011. Retrieved 4 July 2011.
  20. ^ Emery, Daniel (22 June 2011). "LulzSec hits Brazilian websites". BBC. Retrieved 22 June 2011.
  21. ^ Clark, Jack (22 June 2011). "LulzSec takes down Brazil government sites". CNet. Retrieved 22 June 2011.
  22. ^ McMillan, Robert (22 June 2011). "Brazilian Government, Energy Company Latest LulzSec Victims". PC World. IDG. Archived from the original on 22 June 2011. Retrieved 22 June 2011.
  23. ^ Rapoza, Kenneth (25 June 2011). "LulzSec Strikes Brazil Again; Petrobras Denies Being Hacked". Forbes Magazine. New York City. Forbes. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  24. ^ Lopez, Luciana; Brian Ellsworth (24 June 2011). Anthony Boadle (ed.). "Hackers target Brazilian statistics agency". London. Reuters. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  25. ^ Reisinger, Don (27 June 2011). "Anonymous ready to roll in post-LulzSec world". CNET. CBS Interactive. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  26. ^ a b c Albanesius, Chloe (29 June 2011). "LulzBoat Sails On: Anonymous Dumps More Arizona Data". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  27. ^ a b Wilson, Dean (28 June 2011). "Anonymous hacks Anguilla, Brazil, Zimbabwe and Australia governments". The Inquirer. Incisive Media. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  28. ^ Lee, Michael (28 June 2011). "Sydney council victim of AntiSec campaign". ZDNet. CBS Interactive. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  29. ^ a b Albanesius, Chloe (30 June 2011). "Anonymous 'AntiSec' Operation Targets Viacom, Universal Music". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  30. ^ "'Hacktivist' spree continues, Tunisian govt site latest target". GMA News TV. Quezon City. GMA Network, Inc. 28 June 2011. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  31. ^ Stevenson, Alastair (1 July 2011). "As LulzSec disband Anonymous continues re-targeting Arizona law enforcement in the name of Operation Anti-Security". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  32. ^ Shaer, Matthew (1 July 2011). "Anonymous temporarily brings down Arizona police websites". The Christian Science Monitor. Boston. Christian Science Publishing Society. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  33. ^ O'Grady, Jason (3 July 2011). "AntiSec posts passwords from Apple survey server (updated 5x)". ZDNet. CBS Interactive. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  34. ^ Yap, Jamie (4 July 2011). "Anonymous boasts hack into Apple". ZDNet. CBS Interactive. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  35. ^ Ribeiro, John (4 July 2011). "Hackers Claim Apple Online Data Was Compromised". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  36. ^ Wilson, Drew (3 July 2011). "Anonymous Posts Internal Data of the Orange County Democrats". Zeropaid. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  37. ^ Gayathri, Amrutha (21 June 2011). "Operation Anti-Security: Mysterious serial graffiti reported; LulzSec gaining mass support?". International Business Times. New York City. Archived from the original on 21 June 2011. Retrieved 21 June 2011.
  38. ^ ""Anti-Sec" group spreads message through graffiti in Mission Beach". CBS 8. 20 June 2011. Retrieved 21 June 2011.
  39. ^ Stevenson, Alastair (4 July 2011). "Hacked Fox News falsely reports U.S. President Obama Assassinated". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  40. ^ Stevenson, Alastair (4 July 2011). "Hacked Fox News Obama assassination hoax done in the name of Anonymous' Operation Anti-Security". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  41. ^ MacInnis, Laura (5 July 2011). "Hackers falsely claim Obama dead on Fox Twitter feed". Los Angeles Times. Los Angeles. Tribune Company. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  42. ^ Chirgwin, Richard (4 July 2011). "Operation Antisec lames out again: Public data posted in Pirate Bay facepalm". The Register. Archived from the original on 5 July 2011. Retrieved 5 July 2011.

External links

From Wikipedia, the free encyclopedia

Operation Anti-Security, also referred to as Operation AntiSec, is a series of hacking attacks performed by members of now-defunct hacking group LulzSec, the group Anonymous, and others inspired by the announcement of the operation.

Background

The LulzSec hacking group formed on 15 May 2011 and came to national prominence after hacking the websites of the Public Broadcasting Service, Sony, and the United States Senate. [1] [2] Initially, the group claimed to hack "for the lulz" and to enjoy the chaos that follows their intrusions. [3] [4] However, on 20 June 2011, the group announced that they were teaming up with hacking collective Anonymous for a series of attacks they dubbed Operation Anti-Security or Operation AntiSec. The press release accompanying the beginning of the operation called for supporters to steal and publish classified government documents under the name AntiSec. Major banks and corporations were also mentioned as potential targets. [5] Though LulzSec disbanded as a group on 26 June 2011, members have been reported to be continuing the operation from within Anonymous. [6] [7]

The groups involved claim that the operation aims to protest government censorship and monitoring of the internet. [8] LulzSec members also mentions ending what they believe are corrupt racial profiling and copyright laws as a goal of the operation. [9] The War on Drugs has also been given as a reason for particular hacks. [10] In contrast, USA Today described as cyberwarfare targeting governments and large corporations. [11]

LulzSec activities

LulzSec launched the first attacks of the operation against the Serious Organised Crime Agency, the national law enforcement agency of the United Kingdom that handles cybercrime. The group launched a distributed denial-of-service attack against the agency's website on 20 June, taking it offline for only a few minutes. [12] On the same day, they knocked the website of the Jianhua District in Qiqihar, China offline. [13]

On 23 June, the group released a large cache of documents taken from the servers of the Arizona Department of Public Safety. The release, titled "chinga la migra", roughly translating to "fuck the border patrol", including email addresses and passwords and hundreds of documents marked "sensitive" or "for official use only". [14] The group claimed that they did so in retaliation for the passage of Arizona SB 1070, a law they saw as leading to unjust racial profiling. [15] Arizona complained that the release of officer identities and the personal information of their families could put them and their families in danger and gave those exposed security protection. In response, they mobilized the Arizona Counter Terrorism Information Center and locked remote access of Department of Public Safety email accounts. [16]

On 25 June 2011, the group released what they described as their last dump of the operation. The release contained a large amount of information from varied sources. Included was information from numerous companies, including half a gigabyte of data from telecommunications company AT&T and IP addresses from Sony, Viacom, Disney, EMI, and NBC Universal. [17] [18] The AT&T portion included information pertaining to the release of the 4G LTE, 90,000 personal phones used by IBM, and the development of the iPad 3. [18] [19] It also contained over 750,000 usernames and password combinations, including 200,000 from hackforums.net, 12,000 from the NATO online bookstore, 500,000 from the online video game Battlefield Heroes, 50,000 from various video game forums, and 29 from Irish private investigation company Priority Investigations. [18] Finally, an internal manual for AOL engineers and a screencapture of the United States Navy website navy.mil after being vandalized. [18]

On 22 June, an offshoot of the group calling themselves LulzSecBrazil took down the website of the Government of Brazil, brasil.gov.br, and the President of Brazil, presidencia.gov.br. [20] [21] They also targeted the website of Brazilian energy company Petrobras. [22] On 24 June, they claimed to publish access codes and passwords to the Petrobras website along with personnel profiles. However, the company denied that any information had been stolen, and the group removed the claim from their Twitter feed a few hours later. [23] The group also published the personal information of President of Brazil Dilma Rousseff and Mayor of São Paulo Gilberto Kassab. [24]

Anonymous activities

On 27 June 2011, Anonymous published information relating to the Cyberterrorism Defense Initiative's Security and Network Training Initiative and National Education Laboratory program, or Sentinel program, an operation run by the United States Department of Homeland Security and Federal Emergency Management Agency. The hack included information that the agency distributed in 2009 and contained resources on publicly available hacking software, a list of Federal Bureau of Investigation bureau locations, details on counter-hacking tools, and form letters that law enforcement agencies used to obtain user details from internet service providers. [25]

On 28 June, the group released the second collection of documents stolen from the Arizona Department of Public Safety during Operation Anti-Security. Dubbed "Chinga la Migra Communique Dos", or "Fuck the Border Patrol Message Two", the data file contained the names, addresses, phone numbers, internet passwords, and social security numbers of a dozen Arizona police officers. It also contained the emails, voicemails, chat logs of some of them; in at least one instance it included sexually explicit photographs from one of the officer's girlfriends. [26] Anonymous also claimed that the documents included officers forwarding racist chain emails, evidence of K-9 unit officers using percocet, and a Fraternal Order of Police member who is also a convicted sex offender. [26] Anonymous noted that their motivation stemmed from a desire to make police officers "experience just a taste of the same kind of violence and terror they dish out on an every day basis." [26]

On the same day, the group released information obtained from various government sources. Government data from Anguilla, passwords from servers belonging to the Government of Brazil, the users of Zimbabwe government websites, and data from the Municipality of Mosman council were included. [27] The Mosman council dump included mainly publicly available information from the website as well as a not-publicly-available prototype version of the website that had not yet been launched. [28] They claimed to also have access to all Zimbabwean government websites ending in gov.zw. [27] Most of the information and control were given through SQL injection. Anonymous claimed they targeted Brazil for its what they saw as data manipulation and Zimbabwe for the controversial 2008 Zimbabwean presidential election. [29] They also gained control of a website belonging to the Government of Tunisia. They replaced the webpage with a graphic representing Anonymous with text reading "The Internet is the last frontier and we will not let corrupt governments spoil it. We are Anonymous, We are LulzSec, We are People from around the world who are stepping in the name of freedom". [30] The release also included a file containing internal mapping of Viacom servers as well as passwords and data from umusic.com, a website of Universal Music Group. [29]

On 1 July, Anonymous once again targeted Arizona law enforcement by publishing a number of backdoors that could be used to access Arizona police servers to Pastebin. Arizona was forced to pull many websites offline for a time. [31] Websites affected included those of the Department of Public Safety and Mariposa chapter of the Fraternal Order of Police. They also claimed to have found "anti- Muslim" emails during the attack. [32]

On 4 July, Anonymous released a document containing 27 administrative usernames and passwords from an Apple Inc. system used to operate online technical support follow-up surveys. [33] [34] The encrypted passwords were taken from an SQL database. [35]

On 3 July, Anonymous hacked into the database of the Democrat Party of Orange County, Florida. They published a partial membership list and a handbook for precinct committee members. [36]

Actions by other groups and individuals

The original announcement of Operation Anti-Security included a call from LulzSec to spread the name "AntiSec" through physical graffiti. [11] A few days after, a number of locations in Mission Beach, San Diego were vandalized with pieces of graffiti reading the phrase. [37] [38]

On 4 July, the Fox News Twitter feed was hacked and false tweets reporting that President of the United States Barrack Obama has been shot three times and killed were sent from the account. [39] The Script Kiddies, a group with close ties to Anonymous including two hackers with former membership in the group, claimed responsibility for the attack and hoax. The group claimed that the action was in the name of Operation Anti-Security and that they would continue looking to expose information on corporations "to assist with antisec." [40] The United States Secret Service is investigating the incident as a threat on the President. [41]

On 4 July, someone going by the name f1esc posted a file to The Pirate Bay containing 600 megabytes of information described as national "AU election data" and labelled with the tag #Antisec. In reality, the data concerned the 2011 New South Wales state election and was taken from a government website designed to provide election results where the data was publicly available, and the data proved freely accessible information instead of a hack. [42]

References

  1. ^ Morse, Andrew; Sherr, Ian (6 June 2011). "For Some Hackers, The Goal Is Just To Play A Prank". The Wall Street Journal. p. B1. Retrieved 6 June 2011.
  2. ^ Svensson, Peter (2011-06-27). "Parting is such tweet sorrow for hacker group". The Sydney Morning Herald. The Sydney Morning Herald. Retrieved 2011-06-29.
  3. ^ Murphy, David (19 June 2011). "Three Reasons to Fear Lulzsec: Sites, Skills, and Slant". PC Magazine. Ziff Davis. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  4. ^ Taylor, Jerome (16 June 2011). "Who are the group behind this week's CIA hack?". The Independent. London. Independent Print Limited. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  5. ^ Ross, Nick (20 June 2011). "Lulzsec teams up with Anonymous". ABC Online. Australian Broadcasting Corporation. Retrieved 20 June 2011.
  6. ^ Olivarez-Giles, Nathan (29 June 2011). "AntiSec 'hackers without borders' claim new hack on Arizona state police". Los Angeles Times. Los Angeles. Tribune Company. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  7. ^ Weisenthal, Joe (25 June 2011). "Notorious Hacker Group LulzSec Just Announced That It's Finished". Business Insider. Silicon Alley Insider. Archived from the original on 25 June 2011. Retrieved 25 June 2011.
  8. ^ Stevenson, Alastair (22 June 2011). "Operation Anti-Security: Anonymous yet to act while LulzSec rampage". International Business Times. New York City. Archived from the original on 24 June 2011. Retrieved 24 June 2011.
  9. ^ Watts, Susan (24 June 2011). "Newsnight online 'chat' with Lulz Security hacking group". BBC News. London. BBC. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  10. ^ Bright, Peter (25 June 2011). "LulzSec's first Operation Anti-Security release: Arizona DPS". Ars Technica. Condé Nast Publications. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  11. ^ a b Acohido, Byron (20 June 2011). "LulzSec, Anonymous declare war against governments, corporations". USA Today. McLean, Virginia. Gannett Company. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  12. ^ Meyer, David (20 June 2011). "LulzSec claims Soca hack". ZDNet. CBS Interactive. Archived from the original on 20 June 2011. Retrieved 20 June 2011.
  13. ^ Ragan, Steve (21 June 2011). "LulzSec and Anonymous: Hunting for skeletons hidden in closets". The Tech Herald. Archived from the original on 21 June 2011. Retrieved 21 June 2011.
  14. ^ Aamoth, Doug (23 June 2011). "LulzSec Claims Breach Against Arizona Law Enforcement". Techland (Time). Retrieved 23 June 2011.
  15. ^ Tsotsis, Alexia (23 June 2011). "LulzSec Releases Arizona Law Enforcement Data In Retaliation For Immigration Law". TechCrunch. Retrieved 23 June 2011.
  16. ^ "DPS Victim of Cyber Attack". Press Releases. Phoenix, Arizona: Arizona Department of Public Safety. 27 June 2011. Archived from the original on 30 June 2011. Retrieved 30 June 2011.
  17. ^ Whittaker, Zack (25 June 2011). "LulzSec disbands: Final cache includes AT&T internal data and 750,000 user accounts". ZDNet. CBS Interactive. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  18. ^ a b c d Greenberg, Andy (25 June 2011). "LulzSec Says Goodbye, Dumping NATO, AT&T, Gamer Data". Forbes Magazine. New York City. Forbes. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  19. ^ Sin, Gloria (28 June 2011). "LulzSec leaked AT&T LTE rollout plans and iPad 3 rumor". CNET. CBS Interactive. Archived from the original on 4 July 2011. Retrieved 4 July 2011.
  20. ^ Emery, Daniel (22 June 2011). "LulzSec hits Brazilian websites". BBC. Retrieved 22 June 2011.
  21. ^ Clark, Jack (22 June 2011). "LulzSec takes down Brazil government sites". CNet. Retrieved 22 June 2011.
  22. ^ McMillan, Robert (22 June 2011). "Brazilian Government, Energy Company Latest LulzSec Victims". PC World. IDG. Archived from the original on 22 June 2011. Retrieved 22 June 2011.
  23. ^ Rapoza, Kenneth (25 June 2011). "LulzSec Strikes Brazil Again; Petrobras Denies Being Hacked". Forbes Magazine. New York City. Forbes. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  24. ^ Lopez, Luciana; Brian Ellsworth (24 June 2011). Anthony Boadle (ed.). "Hackers target Brazilian statistics agency". London. Reuters. Archived from the original on 26 June 2011. Retrieved 26 June 2011.
  25. ^ Reisinger, Don (27 June 2011). "Anonymous ready to roll in post-LulzSec world". CNET. CBS Interactive. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  26. ^ a b c Albanesius, Chloe (29 June 2011). "LulzBoat Sails On: Anonymous Dumps More Arizona Data". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  27. ^ a b Wilson, Dean (28 June 2011). "Anonymous hacks Anguilla, Brazil, Zimbabwe and Australia governments". The Inquirer. Incisive Media. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  28. ^ Lee, Michael (28 June 2011). "Sydney council victim of AntiSec campaign". ZDNet. CBS Interactive. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  29. ^ a b Albanesius, Chloe (30 June 2011). "Anonymous 'AntiSec' Operation Targets Viacom, Universal Music". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  30. ^ "'Hacktivist' spree continues, Tunisian govt site latest target". GMA News TV. Quezon City. GMA Network, Inc. 28 June 2011. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  31. ^ Stevenson, Alastair (1 July 2011). "As LulzSec disband Anonymous continues re-targeting Arizona law enforcement in the name of Operation Anti-Security". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  32. ^ Shaer, Matthew (1 July 2011). "Anonymous temporarily brings down Arizona police websites". The Christian Science Monitor. Boston. Christian Science Publishing Society. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  33. ^ O'Grady, Jason (3 July 2011). "AntiSec posts passwords from Apple survey server (updated 5x)". ZDNet. CBS Interactive. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  34. ^ Yap, Jamie (4 July 2011). "Anonymous boasts hack into Apple". ZDNet. CBS Interactive. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  35. ^ Ribeiro, John (4 July 2011). "Hackers Claim Apple Online Data Was Compromised". PC Magazine. Ziff Davis. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  36. ^ Wilson, Drew (3 July 2011). "Anonymous Posts Internal Data of the Orange County Democrats". Zeropaid. Archived from the original on 6 July 2011. Retrieved 6 July 2011.
  37. ^ Gayathri, Amrutha (21 June 2011). "Operation Anti-Security: Mysterious serial graffiti reported; LulzSec gaining mass support?". International Business Times. New York City. Archived from the original on 21 June 2011. Retrieved 21 June 2011.
  38. ^ ""Anti-Sec" group spreads message through graffiti in Mission Beach". CBS 8. 20 June 2011. Retrieved 21 June 2011.
  39. ^ Stevenson, Alastair (4 July 2011). "Hacked Fox News falsely reports U.S. President Obama Assassinated". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  40. ^ Stevenson, Alastair (4 July 2011). "Hacked Fox News Obama assassination hoax done in the name of Anonymous' Operation Anti-Security". International Business Times. New York City. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  41. ^ MacInnis, Laura (5 July 2011). "Hackers falsely claim Obama dead on Fox Twitter feed". Los Angeles Times. Los Angeles. Tribune Company. Archived from the original on 5 July 2011. Retrieved 5 July 2011.
  42. ^ Chirgwin, Richard (4 July 2011). "Operation Antisec lames out again: Public data posted in Pirate Bay facepalm". The Register. Archived from the original on 5 July 2011. Retrieved 5 July 2011.

External links


Videos

Youtube | Vimeo | Bing

Websites

Google | Yahoo | Bing

Encyclopedia

Google | Yahoo | Bing

Facebook