Quantcast

Hacker Group Opens Up Call Line For Target Requests

June 15, 2011

Lulz Security (LulzSec), a hacker group, recently opened a telephone request line so fans can suggest potential targets.

It claims to have launched denial of service attacks (DDoS) on several websites as a result.

The unspecified hacks formed part of a wave of security breaches the group called Titanic Takeover Tuesday.

In recent months, LulzSec has attacked Sony, Nintendo and several U.S. broadcasters.

The group publicized the telephone hotline on its Twitter feed.

An individual calling himself Pierre Dubois meets callers to the number with a recorded message.

Although the area code, 614, appears to relate to the state of Ohio, it is unlikely this is the real location, reports BBC News.

Lulz Security said it used distributed DDoS against eight sites based on suggestions callers have made.

It also said it has hit the websites of gaming magazine The Escapist, and multiplayer games EVE Online and League of Legends.

DDoS attacks typically involve crashing a website by inundating it with requests from computers under the attacker’s control.

It is unclear if LulzSec went beyond overloading the sites and sought to gain access to information stored on their servers.

The organizations and companies LulzSec targets are often portrayed as having acted against the interests of citizens or consumers.

The hacker group claimed its attack against SonyPictures.com was because of an ongoing inability to secure users’ personal data.

According to Peter Wood, founder of security consultancy First Base, hacktivists see their role as staging valid protests in the most high profile way possible.

“The things they are exploiting at the moment are the sort of mistakes that organizations seem to have been making ever since they connected to the Internet,” Wood told BBC.

“Finally there are some players out there who are using them as a means to protest. Whether everyone agrees with them is a different question.”

On the Net:




comments powered by Disqus