Jump to content

Lulzsec


hda
 Share

Recommended Posts

We recently learned that hackers gained unauthorized access to the

decade-old BioWare server system supporting the Neverwinter Nights

forums. We immediately took appropriate steps to protect our

consumers' data and launched a thorough ongoing evaluation of the

breach. We have determined that no credit card data was compromised

from the servers, nor did we ever have or store sensitive data like

social security numbers. Our investigation shows that information

such as user names, encrypted passwords, email addresses, mailing

addresses, names, phone numbers, CD keys and birth dates from

accounts on the system may have been compromised, as well as other

information (if any) that you may have associated with this forum

account. In an abundance of caution, we have disabled your legacy

Account. To create a new account please visit social.bioware.com.

We take the security of your information very seriously and regret

any inconvenience this may have caused you. If your username, email

address and/or password on your Neverwinter Nights account are

similar to those you use on other sites, we recommend changing the

password at those sites as well. We advise all of our fans to always

be aware of any suspicious emails or account activity and report any

suspicious emails and account activity to Customer Support at

1-877-357-6007.

If you have questions, please visit our FAQ at

http://support.ea.com/app/answers/detail/a_id/5367/ or contact

Customer Support at the phone number above.

e aí está,

AGAIN

mostra k a EA fez 0 desde a ultima vez...

olha o impacto final no consumidor : nao compro mais merda nenhuma deles uma vez que se mostraram incapazes de proteger os dados devidamente

CDkeys compromised awesome eh?

Edited by Lancer
Link to comment
Share on other sites

LulzSec hacking group announces end to cyber attacks

_53265517_e15e421a-14c7-4ee3-b4d1-c8b94b31e078.jpg

A hacker group that has attacked several high-profile websites over the last two months has announced that it is disbanding. Lulz Security made its announcement through its Twitter account, giving no reason for its decision.

A statement published on a file-sharing website said that its "planned 50-day cruise has expired".

The group leapt to prominence by carrying out attacks on companies such as Sony and Nintendo.

Broadcasters Fox and PBS, the CIA, and the United States Senate have also been cyber-attacked by the group.

As a parting shot, the group released a selection of documents apparently including confidential material taken from the Arizona police department and US telecoms giant AT&T.

Correspondents say LulzSec's announcement could be a sign that its members are nervous because of recent police investigations, including the arrest of a British man suspected of links to the group, and efforts by rival hackers to expose them.

'Microscopic impact'

The group's identities remain anonymous and it has not been possible to contact its members directly to confirm its statement.

The statement said that "our crew of six wishes you a happy 2011".

"So with those last thoughts, it's time to say bon voyage," it added.

"Our planned 50 day cruise has expired, and we must now sail into the distance, leaving behind - we hope - inspiration, fear, denial, happiness, approval, disapproval, mockery, embarrassment, thoughtfulness, jealousy, hate, even love. If anything, we hope we had a microscopic impact on someone, somewhere."

But LulzSec urged its supporters to carry on.

"We hope, wish, even beg, that the movement manifests itself into a revolution that can continue on without us," the statement said.

"Please don't stop. Together, united, we can stomp down our common oppressors and imbue ourselves with the power and freedom we deserve."

The group had previously told the BBC's Newsnight programme that it wanted to target the "higher ups" who write the rules and "bring them down a few notches".

In an online Q&A, the hacker known as Whirlpool, who described himself as "captain of the Lulz Boat", said that while the group had begun hacking "for laughs" - for which the word "lulz" is cyber-slang - it evolved into "politically motivated ethical hacking".

And in an interview with the Associated Press on Friday, a LulzSec member said the group had at least five gigabytes of "government and law enforcement data" from around the world, which it planned to release in the next three weeks.

Ryan Cleary, 19, from Wickford, Essex, was arrested as part of a Scotland Yard and FBI probe into LulzSec and charged with hacking the website of the UK Serious Organised Crime Agency.

Link to comment
Share on other sites

oh, no mor lulz? is it ninjitsu power? :unsure:

e então o :

The group had previously told the BBC's Newsnight programme that it wanted to target the "higher ups" who write the rules and "bring them down a few notches".

? :(

I am dissapoint.

Link to comment
Share on other sites

oh, no mor lulz? is it ninjitsu power? :unsure:

e então o :

The group had previously told the BBC's Newsnight programme that it wanted to target the "higher ups" who write the rules and "bring them down a few notches".

? :(

41787_214277156210_9019_n.jpg

fix'd :-..

Edited by Lancer
Link to comment
Share on other sites

  • 3 weeks later...
Português desmente ser líder do LulzSec (com áudio)

Hugo Carvalho desmente ser líder do LulzSec, afirmação avançada hoje pelo blogue LulzSec Exposed que afirma ter seguido o rasto eletrónico que o levou até ao português técnico em segurança e redes informáticas.

O blogue LulzSec Exposed avança com informações fornecidas por dois dos seus membros onde é revelado, passo-a-passo, o caminho que foi percorrido para descobrir a identidade do alegado líder do grupo LulzSec. Segundo as ligações descobertas e os domínios utilizados, os dois membros do blogue afirma que o português Hugo Carvalho é Sabu, líder do grupo que durante 50 dias efetuou vários ataques a entidades como a CIA, a Sony e a Apple (só para nomear alguns).

A Exame Informática conseguiu encontrar Hugo Carvalho e falou com ele ao telefone. Na conversa, desmente categoricamente a acusação, refuta qualquer tipo de ligação a ações de hacking ou a grupos de hackers e avança que vai contactar a Polícia Judiciária para negar estas afirmações.

Hugo Carvalho explica que vendeu há algum tempo o domínio que é indicado como seu e estando na base dos ataques. Adianta que não conhece a identidade de quem comprou.

http://aeiou.exameinformatica.pt/portugues-desmente-ser-lider-do-lulzsec-com-audio=f1010025[/code]

Link to comment
Share on other sites

eheheheh já se deve é estar a borrar todo, lol

mas que tinha a sua "piada" o cabecilha ser tuga lá isso tinha...

B)

s fosse pq é q n tinham atacado as agências de rating internacionais?

Tinha mais piada conseguirem entrar lá e leakarem documentos e mails internos ;)

Link to comment
Share on other sites

Um gajo q podia ser de qq parte do mundo, que podia mandar cá para fora documentos confidenciais de várias grandes potências mundiais ia escolher Portugal como alvo?

N sei, mas soa-me a demasiada bandeira...

Link to comment
Share on other sites

Acusado de ser líder de hackers recebeu proposta de emprego

Nome de Hugo Carvalho tem aparecido em blogues norte-americanos como sendo o mítico líder do grupo de hackers LulzSec. Português nega tudo e já foi à PJ denunciar as calúnias.

Um português é acusado por vários blogues norte-americanos de ser Sabu, o mítico líder do LulzSec, grupo de hackers que fez ataques recentes a sites da CIA ou da Sony.

Num blogue intitulado Jester's Court (O Tribunal de Jester), famoso por revelar a identidade de hackers que atacam sites do Governo norte-americano, Hugo Carvalho é apontado como sendo o número um daquele grupo de ciberterroristas. E disponibiliza os contactos telefónicos e, até, a morada do português.

Ao Expresso, Hugo Carvalho, especialista em redes informáticas, desmente as notícias e explica que vendeu em 2009 o domínio que é indicado como seu e que estará na base dos ciberataques mundiais. "Desconheço a identidade do comprador. Só falámos uma vez, por email, nessa altura".

Ida voluntária à PJ

Depois de ler as notícias em diversos sites, Hugo Carvalho optou, quinta-feira, por deslocar-se por iniciativa própria à Polícia Judiciária e pondera apresentar uma queixa por difamação: "Tenho até recebido telefonemas anónimos dos EUA, a desejar-me sorte para não ser extraditado...".

Mas nem tudo tem sido negativo para Hugo Carvalho. Recentemente, recebeu duas ofertas de emprego de empresas de novas tecnologias portuguesas: "Recusei. Não tenho os conhecimentos informáticos do tal Sabu".

Expresso

Link to comment
Share on other sites

"Hugo Carvalho, lider da LulzSec, é afinal de origem Portuguesa.

Segundo o Blog LulzSec Exposed, o Hugo aka Sabu aka Visigod enviou um e-mail a “tentar” provar que ele não tinha ligação alguma à LulzSec. No entanto, ao fazer o spoofing do e-mail esqueceu-se de um pormenor: o X-Mailer que enviou, Microsoft Outlook 14.0, apenas foi lançado em 2010. O domínio PRVT.ORG foi vendido em 2008!

Toda a informação está no site LulzSec Exposed. Divirtam-se."

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.