LulzSec hacks expand to damage ordinary people, not just governments and corporations

Group posts emails, passwords of 62,000 people from random sources for no real reason

Attention-whoring hactivist/griefer group LulzSec has begun to claim secondary victims following a string of hacks and attacks that penetrated Sony, PBS, the CIA, the U.S. Senate, a series of gaming sites and, apparently, any server or account they could hack for a little ad hoc random-user personal-data posting.

Some users in the list of 62,000 LulsSec posted yesterday are already reporting incidents of fraud in which identity thieves gained access to credit-card or bank accounts using information posted by LulzSec.

Unlike other incidents in which LulzSec penetrated the security of a corporation or government agency and then posted the results, there is no unifying thread. The list is just 62,000 emails and passwords from civilian, corporate and military sources, apparently from gaming servers, Facebook and a range of other sources.

InfoWorld interviewed a few of the victims, whose offense seems to have been using sites that stored their data in cleartext, and using the same password for more than one site – both of which LulzSec posters have complained about in the past.

LulzSec gave no reason or background on the source or why it decided to post the information.

It did retweet complaints from some victims of fraud resulting from the post, about which one LulzSec poster Tweeted:

"The victims in the below four retweets are peons. You are not a peon. You are a lulz lizard. The peons are your toys, and we love to play..."

Having tortured Corporate America and Big Government, LulzSec is now apparently having fun torturing the little people.

If you'd like to show support for their agenda and tactics, in the real world rather than the digital, spend the weekend collecting bricks and throwing them through the windows of cars and houses you choose at random.

Do it for the lulz.

What’s wrong? The new clean desk test
Join the discussion
Be the first to comment on this article. Our Commenting Policies