Lizard Squad get hacked, didn't protect user data

So what kind of assholes signed up to use their services. Seriously, fuck those people.

Not to mention the fact that, you can use the same services for free. SMH.

From the article:

Tech news site Ars Technica also got hold of the database dump which was briefly posted on the Mega file-sharing system. It said most of those who used it were gamers keen to stop rivals playing a particular game. Minecraft servers were a favourite target of the Stresser users, it said.

So pretty much douches who paid other douches to knock out their competition in games (or Minecraft).
 
In what universe would this be surprising?

terrible-nature-005.gif
 
The script kiddies don't even know to do basic level encryption.
AES is hard, like who's ever heard of that? It's not like it's an industry standard that's now accelerated at the hardware level and available in various open source implementations for every major operating system...
 
"There seems to be a general sense in the security research community that these guys are in way over their heads, and that if we can't bring to justice a bunch of teenagers in Western nations who are rubbing it in everyone's faces, then that's a sad state of affairs."

heh.
 
They didn't buy any tool, they paid to use their botnet to bring down sites.

They may have said they were in it fore the lulz, or to teach companies a lesson, but like all the other criminals they were just in it for the money.
Yeah somehow I doubt LS is actually that worried that their sterling reputation of data security has been irreparably tarnished.
 
So

- Script kids hack gaming social networks
- Deploy an existing malware that take over certain routers that are in turn used to host a DDoS takedown service
- They charge for said service
- Get hacked in return and expose all the user data of those who signed up for the service due to no knowledge of how to handle encryption.


Beautiful.
 
"All registered usernames and passwords were stored in plain text," said Mr Krebs, adding that only a few hundred of those who signed up had paid to use it.

After having a Cryptography exam this morning, this is just too much.
 
Honestly, getting caught is not a bad thing for these guys, they'll get cushy cyber security jobs after being in jail.

This is part of a plan, getting caught is not even bad
 
After having a Cryptography exam this morning, this is just too much.

Here's a thought... maybe they didn't WANT the data encrypted... Encrypting the data would mean they wouldn't have access to it either.

Those kids likely wanted the user names, e-mails, and passwords so they could do other things with them. Watch where you sign up boys and girls.
 
Honestly, getting caught is not a bad thing for these guys, they'll get cushy cyber security jobs after being in jail.

This is part of a plan, getting caught is not even bad

Not this shitteru again.

They won't. DDOS != hacking. EVERYONE can ddos with enough time and money. It takes NO SKILL whatsoever. If you know how to turn on your pc and google you're pretty much just as 'good'.
 
Not this shitteru again.

They won't. DDOS != hacking. EVERYONE can ddos with enough time and money. It takes NO SKILL whatsoever. If you know how to turn on your pc and google you're pretty much just as 'good'.

Not even money. LOIC is free and with that hivemind mode can be controlled by an IRC bot... It's pretty much installing a program and going "1m 1337 n0w!". Then going to hackertyper.com and pressing buttons.
 
Here's a thought... maybe they didn't WANT the data encrypted... Encrypting the data would mean they wouldn't have access to it either.

Those kids likely wanted the user names, e-mails, and passwords so they could do other things with them. Watch where you sign up boys and girls.

I think you're giving them way too much credit
 
Top Bottom