Hackers Gone Wild
Hackers Gone Wild
Hackers Gone Wild
Volume 13, Issue 1, pp. 133-143, 2012 HACKERS GONE WILD: THE 2011 SPRING BREAK OF LULZSEC
Stan Pendergrass, Robert Morris University, wspst2@mail.rmu.edu ABSTRACT Computer hackers, like the group known as Anonymous, have made themselves more and more relevant to our modern life. As we create and expand more and more data within our interconnected electronic universe, the threat that they bring to its fragile structure grows as well. However Anonymous is not the only group of hackers/activists or hacktivists that have made their presence known. LulzSec was a group that wreaked havoc with information systems in 2011. This will be a case study examination of their activities so that a better understanding of five aspects can be obtained: the Timeline of activities, the Targets of attack, the Tactics the group used, the makeup of the Team and a category which will be referred to as The Twist for reasons which will be made clear at the end of the paper. Keywords: LulzSec, Hackers, Security, AntiSec, Anonymous, Sabu INTRODUCTION Information systems lie at the heart of our modern existence. We deal with them when we work, when we play and when we relax; texting, checking email, posting on Facebook, Tweeting, gaming, conducting e-commerce and ebanking have become so commonplace as to be nearly invisible in modern life. Yet, within each of these electronic interactions lies the danger that the perceived line of security and privacy might be breached and our most important information and secrets might be revealed and exploited. Sometimes this fear is based on an imagined vulnerability inherent within the system itself or it could be based on a fear that individuals will somehow actively exploit those vulnerabilities for their own unknown purposes. Those individuals have over the years become known as hackers. While the term hackers can be used to designate any number of individuals or groups with any number of purposes or connections, as of late, it has been used more and more to define one internet-based group known as Anonymous. They have organized and participated in Distributed Denial of Service (DDoS) attacks, rendering websites temporarily unavailable and unusable, hurting companies through lost potential revenue and increased security expenses. They have organized and participated in electronic and physical protests and operations which have run the gamut from serious political statements to harmless fun. But Anonymous is not the only group of hackers in cyber space. Other groups have reared up and come into the spotlight. In the Spring and Summer of 2011, one group was particularly active and eclipsed Anonymous for a time. This group called itself LulzSec, a portmanteau of Lulz (the plural of the acronym for Laughing Out Loud or lol) and Security and announced they were in the business of stealing information and distributing it to the world, for the lulz of it. For eight weeks that year, they taunted law enforcement authorities, hacked into multi-billion dollar corporations, federal agencies, internet security firms and government institutions and brazenly posted their illgotten goods for the all the world to see. Then, they suddenly announced their retirement and were gone, just as quickly as they had appeared. However their story did not end when they supposedly retired. That story is playing out even today, in ways that were almost unbelievable. This paper will look at the activities of LulzSec and describe the events of this recent hacker group and the ways it operated, so that the complete story might be better understood. RESEARCH METHODOLOGY This study involved no participants per se, in that there were no direct interviews with people who might claim to be a part of LulzSec or claim to know someone who is or was in the group. There is almost no way to verify those claims and those who are or were in the group are most likely not going to admit it pending legal action or indictment. Therefore, all information was taken from secondary data collection.
133
134
Figure 1. ASCII Art representation of the LulzBoat on May 15, 2011 PasteBin Press Release The 23rd of May brought a release of data from Sonymusic.co.jp databases; nothing particularly useful but still another hack of a Sony website [9]. On the 24 th of May, PBS ran a Frontline Series documentary titled WikiSecrets and focused on PFC Bradley Manning, the American soldier accused of leaking classified information and documents on the war to the whistleblower website WikiLeaks. In retaliation for what they claimed was a biased and unflattering portrait of Manning and WikiLeaks founder, Julian Assange, on 30 May, LulzSec hacked into and defaced the PBS.org website by posting a fake news story on the site which stated that rappers Tupac Shakur and Biggie Smalls, were not deceased but were alive and well and living in an unnamed small town in New Zealand [7, 9].
135
Figure 2. Hacked PBS.org Website article stating Tupac Shakur is living in New Zealand
Figure 3. ASCII Art Press Release Banner on May 30, 2011 PasteBin Press Release On 2 June, LulzSec released data from their latest hack which they labeled Sownage, for Sony + Ownage. LulzSec said it was able to gain passwords, e-mail addresses, home addresses, birthdates, and all Sony opt-in data associated with users' accounts from some one million users of SonyPictures.com [9]. Some of the exposed personal information also included home telephone numbers which was confirmed by the Associated Press. None of the users IDs and passwords were encrypted by Sony; this, still after the other numerous hacks months before! Information from the databases of Sony BMG Belgium and the Netherlands were also included as well as a varied assortment of Sony user and staffer information [9, 22]. Purportedly in response to a White House announcement that an act of cyber sabotage on the United States by another country could be considered an act of war [11], LulzSec defaced the website and released email, username
136
137
Tools LulzSecs greatest tool was their attack. Two methods of attacks were used. The first and most extensively used was Structured Query Language (SQL) code injections into websites. When successful, it would allow LulzSec access to website internal information such as system files, content and the most valuable content, users identification data. This type of attack was where LulzSecs had its greatest successes. Nearly all of their influence was as a result of leaked data and information they were able to obtain from hacked websites and databases. The second method was through DDoS attacks however they rarely used this. DDoS attacks require either a large number of participants or continued use of special software which repeatedly bombards websites until the shut down. Once they had SQL injection-obtained data, there were a number of social media, utility and file sharing sites they used to announce, store and thus disseminate the data. For instance, Twitter (@LulzSec) was used to make public announcements of activities, actions, success, and to convey whatever up-to-the-minute information LulzSec wanted to convey. Some Twitter feeds would have attachments which linked to PasteBin posts which could lead to their more formal and lengthy press releases. Those releases were often more than Twitters limit of 140 characters so PasteBin was used. LulzSec was also fond of including ASCII art in the header and body of the release. Press releases and Twitter Tweets often included addresses to links on the file sharing site Pirate Bay which often in turn contained torrent files with the stolen data. This way, as long as Pirate Bay hosted the link, anyone could access and download the data files. Internet Relay Chat (IRC) Channels were used for active and prolonged conversations within the group [10]. LulzSec even solicited BitCoin electronic cash donations to fund their continued activities [17].
138
Figure 4. LulzSec Twitter account logo None of this could have been accomplished without another important tool, anonymity. In order to achieve continued anonymity, they had to use anonymity-guaranteeing software such as The Onion Router (TOR). TOR software was originally developed by the Navy to provide anonymity to users. Users access the TOR network by installing the free software package. By using the software, all content is passed between random guard, relay and exit node servers so that the users unique Internet Protocol (IP) address cannot be directly traced back to the original point of entry, i.e., their own computer. Anonymity allowed LulzSec to communicate, hack, post and taunt without law enforcement being able to detect where or even who they were. Of course this anonymity was only possible it one used the TOR software and network exclusively [25, 29]. Tactics The name the group chose for themselves, a portmanteau of Lulz and Security, could be considered telling in that it was an indication of both their motivation (lulz) and inclination (security). Their motivation was to randomly hit a wide variety of targets and post the stolen data for anyone to use. While in some cases they hinted at how it might be used [16], for the most part it was posted with no provided purpose other than for their own amusement to show the world what they did and that they could do it. These actions had a direct and profound effect on perceived internet security, their inclination. Taken in a broader context, it was the security of the system itself which was affected, not necessarily security entities themselves. For instance, while they did attack some websites belonging to entities whose actual purpose was security (Infraguard, FBI, CIA, Arizona Law Enforcement), they also went after entities that had nothing to do with security per se (Sony, PBS, Fox News, Bethesda Softworks). But in the end, all of those sites as well as sites which had nothing to do with LulzSec attacks, were stained with the hackers brush. Those effects continue to linger on through to today. The lulz showed through in a variety of ways. For instance, their press releases and tweets were often very funny and clever. Their second announcement ended with the below divider before the hacked Fox.com emails and password information. ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------Raped material goes below the shiny dashes oh god theyre so shiny------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ [15] There was a taunting aspect to everything they did. Press releases often dared the authorities to come after them. It was a braggadocio attitude that undoubtedly infuriated those who were trying to track them down, not only law enforcement agencies but other white hat and black hat hackers who were working to expose them as well.
139
140
141
4. 5. 6.
7.
8.
9. 10.
11. 12.
22.
142
143