Lulz Security the hacker group that attacked several government and commercial websites over the last two months has announced that it is disbanding. It made it’s announcement through its Twitter account, giving no reason for its decision.
A statement published on a file-sharing website said that its “planned 50-day cruise has expired”.
The group leapt to prominence by carrying out attacks on companies such as Sony and Nintendo. It also carried out attacks on US broadcasters Fox and PBS and also the CIA, and the United States Senate. However the group said it plans to release a selection of documents apparently taken from the Arizona police department and the telecom giant AT&T.
Many believe that the group’s announcement may be due the recent police investigations, including the arrest of a British man suspected of links to the group, and efforts by rival hackers to expose them or other members of the hacker “community” who have forced the group into retreat. A document posted online in the last 24 hours purports to be a history of LulzSec, complete with full details on its leaders. . “We’ve been tracking and infiltrating these kids,” says the document, and
goes on to name people in the UK, Amsterdam and New York.
Lulz Security in parting statement read “our crew of six wishes you a happy 2011”, and that it’s last thoughts were to say “bon
voyage…our planned 50 day cruise has expired” it said it hoped it had left a mixture of “hope – inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love” and urged other supporters to carry on begging others for a movement that “manifests into a revolution”.
A 19 year old man from Essex, named as Ryan Cleary has been arrested over hacking into websites. Police have not confirmed the identity of the man however.
It is thought that the man may have been involved with the hacking group LulzSec (Laugh Security) which recently broke into US Government sites; involved in breaking into Sony’s database, PBS Broadcasting, Infragard the FBI affiliated website, Senate.gov (the US Senate website) and Nintendo’s site.
Lulz Sec have succeeded in putting the websites down by DDoS (Distributed Denial of Service) where the sites servers are overwhelmed with requests for pages. The group is also believed to have taken information from various servers and may have broken into the UK Census from the Office of National Statistics.
Yesterday the Serious Organised Crime Agency’s website was compromised and the agency took the website down due to DDoS attack, although a spokeperson confirmed it was their public website and the attack did not compromise any data held by the agency.
Scotland Yard have not confirmed whether the person they have arrested was linked to the Lulz Attack on SOCA but have said the arrest was a”pre-planned intelligence led operation” and that it followed after an investigation into network intrusions and distributed DoS attacks on major business and Government agencies.
LulzSec have recently threatened to attack further Government and Banking systems in what they called AntiSec, LulzSec on Monday tweeted: “Tango down – in the name of #AntiSec”.
The man has been arrested under the Computer Misuse Act and Fraud Act and is being questioned at a central London police station.