IDG News Service - Time may be running out for the members of LulzSec as police continue to step up their inquiries into the hacking group.
On Monday, the U.S. Federal Bureau of investigation executed a search warrant at a Hamilton, Ohio, residence -- a raid that local media has linked to the ongoing investigation of LulzSec. The raid comes two days after LulzSec ended a 50-day hacking rampage by posting internal documents belonging to AT&T and data stolen from gaming forums and a NATO website.
Reached by telephone Wednesday, Michael Brooks, a spokesman with the FBI's Cincinnati office, said a raid had occurred Monday at an address on Jackson Road, Hamilton, but he would neither confirm nor deny that the arrest is linked to LulzSec. The warrant in the case is under seal and the name of the person questioned by the FBI has not been released.
Last week, police in the U.K. arrested Ryan Cleary of Wickford, Essex, thought to be the operator of the group's IRC (Internet Relay Chat) server, and they have also reportedly questioned another person, Laurelai Bailey, in connection with the group.
On Monday, one of LulzSec's leaders, known as Topiary, deleted his Twitter messages and said he was "sailing off."
Groups calling themselves the A Team and LulzSec Exposed have popped up in recent days and started posting information on the group's members -- all of which is being vetted by the FBI, according to a source familiar with the matter.
In fact, LulzSec itself may have been the impetus for Monday's raid. Last week the group turned against two of its former members and published personal information about them, saying they were responsible for computer crimes and encouraging the FBI to investigate. LulzSec was angry because it believed the two had published chat logs exposing some of its inner workings.
One of those two, who uses the hacker names [redacted] and m_nerva, was a resident of Hamilton, Ohio -- the town where Monday's search warrant was executed.
LulzSec has been the target of an international law enforcement search after the group hacked websites belonging to U.K. Serious Organised Crime Agency, the U.S. Public Broadcasting Service, Sony, the U.S. Central Intelligence Agency and several FBI-affiliated groups.
It was this mounting pressure from law enforcement that finally caused LulzSec to disband, said E.J. Hilbert, president of Online Intelligence and a former FBI agent who has been following the group closely. "LulzSec was a group of punk kids out to have some fun that just kept pushing and pushing and they took it too far," he said.
Several members have already been in contact with law enforcement, Hilbert said. "Their members will be picked off one by one if they haven't already been, and I know some of them already have been," he said.
- Everything You Know About Enterprise Security Is Wrong
- UK man charged with hacking Federal Reserve
- McAfee Offers Global Response to Nationalized Malware
- Tech Industry Praises Cybersecurity Framework From White House
- Ransomware like Cryptolocker uses Bitcoin, other virtual currencies for payment
- Trial for alleged Silk Road creator Ross Ulbricht set for November
- Target attack shows danger of remotely accessible HVAC systems
- U.S. is investigating Target data breach, AG Holder says
- Russian man pleads guilty in SpyEye malware case
- Suspected email hackers for hire charged in four countries
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Who's Spying on You? You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against...
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Cybercrime and Hacking White Papers | Webcasts