Zombie LulzSec brags of exposing loved-up privates
Reborn hack gang claims military dating site raid
A group claiming to be the re-animated corpse of the LulzSec hacking group is getting its lulz from messing up the love lives of army personnel. The personal details of tens of thousands of servicemen and women may have been exposed following a hack on a US-based military dating website.
"LulzSec Reborn" posted a message on PasteBin announcing the hack of MilitarySingles.com, claiming that it had swiped the site's email database, snaffling more than 170,000 profiles in the process. The group also boasted it had obtained usernames, passwords and in some cases physical addresses of service personnel looking for love, and the men and women interested in hooking up with the boys and girls in uniform.
The motives for the purported hack – if any beyond pure devilment – remain unclear.
Militarysingles.com, which bills itself as the "dating website for single soldiers... and those interested in meeting them", is run by a firm called eSingles Inc. The firm has yet to comment publicly on the hack, which remains unconfirmed. Nonetheless it would be a good idea for members of MilitarySingles.com to change their passwords, if only as a precaution. In addition, members of the site should double-check to make sure they aren't using the same password and username combination elsewhere on the net, a common security mistake, as advised in a blog post commenting on the reported hack by net security firm Sophos here.
The original LulzSec gang began as a splinter group of Anonymous before mounting scores of high-profile hacks over as a seven-week period of mischief and mayhem prior to disbanding in late June last year. A number of its alleged members were arrested in a high-profile takedown operation earlier this month, largely on the evidence of the group's alleged leader, Hector Xavier "Sabu" Monsegur. ®
Sponsored: VersaStack at-a-glance brochure