Anonymous, LulzSec vow to hack on
Nothing law enforcement can do to stop us, groups say in statement following this week's arrests
Computerworld - In a defiant statement addressed largely at FBI director Steve Chabinsky, members of the Anonymous and LulzSec hacktivist groups vowed to continue with their hacking campaigns and dared law enforcement to try and stop them.
The statement comes just two days after the FBI arrested 14 alleged members of Anonymous in connection with a series of distributed denial of service (DDoS) attacks against PayPal last year.
The immediate provocation appears to have been some comments made by Chabinsky in a NPR report following the recent arrests.
In it, Chabinsky is quoted as saying that chaos on the Internet is unacceptable. "[Even if] hackers can be believed to have social causes, it's entirely unacceptable to break into websites and commit unlawful acts."
In their response, posted on Pastebin.com, Anonymous and LulzSec members claimed their hactivist campaigns were motivated by a desire to expose what they described as lying governments, corrupt corporations and powerful lobbyists.
"We will continue to fight them, with all methods we have at our disposal, and that certainly includes breaking into their websites and exposing their lies," the letter said.
"We are not scared any more. Your threats to arrest us are meaningless to us as you cannot arrest an idea," the groups claimed. The two groups claimed they were acting like bandits only because they were forced to. "The Anonymous bitchslap rings through your ears like hacktivism movements of the 90s. We're back -- and we're not going anywhere."
Given the highly decentralized and loosely organized nature of the two groups it's hard to say how much of the content in the letter is bluster, how much is real or even how much it represents the true sentiment among members.
Certainly both Anonymous and LulzSec have demonstrated their ability to strike at what appears to be pretty much at will and pretty much against any target.
Just today for instance, Anonymous released a 36-page restricted document that is claimed to have obtained by breaking into a Web server at North Atlantic Treaty Organization (NATO).
In a Twitter message, the group said that it has 1GB of material from NATO which it would not release because it would be irresponsible.
Over the last week, both groups have claimed credit for breaking into Rupert Murdoch's media sites. In one attack LulzSec compromised DNS servers at News International so that visitors to the group's Sun tabloid site were redirected to a fake story proclaiming Murdoch's death.
And in recent weeks and months both Anonymous and LulzSec have claimed responsibility for breaks-in at military contractor Booz Allen Hamilton, Sony and several other high-profile organizations.
The attacks have been mostly designed to embarrass and to provoke rather than to create any real damage. In most instances, the groups have cited some political or social cause for their attacks.
Recently for instance, when Anonymous attacked police union sites in Arizona, it claimed it was doing so because of the state's tough immigration laws.
However, law enforcement has made some important gains as well. Last weeks raids for instance, netted a total of 14 individuals who are allegedly members of Anonymous. Several arrests have been made overseas as well. Last month U.K police arrested Ryan Cleary, a 19-year old who is believed to be connected to both LulzSec and Anonymous.
Computers seized from last week's arrests and from Cleary's arrests are likely to lead authorities to more people connected with the two groups.
Whether such arrests will dampen their enthusiasm or only spur more attacks remains to be seen.
Jaikumar Vijayan covers data security and privacy issues, financial services security and e-voting for Computerworld. Follow Jaikumar on Twitter at @jaivijayan or subscribe to Jaikumar's RSS feed . His e-mail address is firstname.lastname@example.org.
- Arrests made after international cyber-ring targets StubHub
- International police operation disrupts Shylock banking Trojan
- Spamhaus pushes for arrests of alleged DDoS participants
- Accused Russian point-of-sale hacker arrested, will face U.S. charges
- No-IP regains control of some domains wrested by Microsoft
- Microsoft legal action cramping other hacking campaigns, Kaspersky says
- Microsoft admits technical error in IP takeover, but No-IP still down
- QuickPoll: Why hasn't Windows XP come under attack from hackers?
- Cybercrime losses top $400 billion worldwide
- U.S., foreign agents disrupt Gamover Zeus botnet
Read more about Cybercrime and Hacking in Computerworld's Cybercrime and Hacking Topic Center.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Comprehensive Advanced Threat Defense The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-based approach to...
- Advanced Threat Defense: A Comprehensive Approach In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive...
- Live Webcast Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- Security Vulnerabilities Associated With Having Local Administrator Privileges Viewfinity will demonstrate how removing admin rights and granularly managing privileges at the application level reduces the attack surface.
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Cybercrime and Hacking White Papers | Webcasts