Lizard Squad get hacked, didn't protect user data

Honestly, getting caught is not a bad thing for these guys, they'll get cushy cyber security jobs after being in jail.

This is part of a plan, getting caught is not even bad

Why do people constantly spout this nonsense? This isn't a part of anyone's plan. This isn't Catch Me if You Can and these guys aren't Leonard DiCaprio. These kids aren't good at what they do, and they certainly don't have enough talent or skill to impress even an IT Director for a local grocery chain much less the American government.
 
Well, they might get a job after jail..wait a sec..
hEo3xNe.gif

"All registered usernames and passwords were stored in plain text"
And that's why they call them script kiddies.
 
Why do people constantly spout this nonsense? This isn't a part of anyone's plan. This isn't Catch Me if You Can and these guys aren't Leonard DiCaprio. These kids aren't good at what they do, and they certainly don't have enough talent or skill to impress even an IT Director for a local grocery chain much less the American government.

.
 
I also find it funny that some Lizard squad twitter accounts now have different people using them. But they are still pretending to be the old posters.
 
So the people responsible for the original attack are in the clear? Only the idiots that tried to use their tools are exposed?
 
So about this stolen tool that Lizard Squad passed off as their own then exposed their own security ignorance with it...could one have actually used it to DDoS the service itself (or the Lizard Squad for that matter)?
 
So about this stolen tool that Lizard Squad passed off as their own then exposed their own security ignorance with it...could one have actually used it to DDoS the service itself (or the Lizard Squad for that matter)?

you can't really DDoS a botnet unless you know the command server's address, I guess. And illegal "stress testers" don't use their own hardware anyway, they use compromised servers owned by other people. I think Krebs said that this one was largely run on compromised home routers? If you were to try to attempt to retaliate for an attack on your system [don't do this], you'd be doing 0 damage to the attackers and probably fucking with some other poor schmuck's personal equipment or host.

Do a search on "amplification attacks" (DNS/NTP/etc) and you'll find a bunch of security blogs explaining them and how to both secure your own hosts from being compromised, as well as defending against inbound attacks.
 
Top Bottom