Feeds

LulzSec sneak Sabu buys six more months of freedom

Federal grass gets more time in pasture

High performance access to file storage

Hector Xavier Monsegur, aka Subu, who allegedly led and then sold out the LulzSec hacking group, has bought himself another six months of freedom from the big house.

The US Department of Justice has filed a motion in the New York courts to keep Monsegur on the streets until February 2013 due to his "ongoing cooperation with the government." Monsegur unsurprisingly offered no contest to the motion, and has reportedly missed earlier court appearances over fears for his personal safety.

Monsegur is claimed to be one of the key figures behind the LulzSec group hacking spree, which conducted a 50-day DDoS and defacement campaign against websites including the CIA, the UK's Serious Organised Crime Agency, security firm HB Gary, and softer targets like Sony, Fox, and PBS. His role as an informant led to the almost-complete takedown of the LulzSec group, according to the US authorities.

He was caught after failing to disguise his IP address and was arrested in June 2011. He promptly pleaded guilty to charges that could result in 124 years and six months in prison, but agreed to carry on his role within the group for several months. Monsegur collected information on current and planned targets and worked to limit the scope of any further attacks.

sabu

An eminently trustworthy character

In August 2011, Monsegur mission led to the arrests of suspects in the US, UK, and Ireland. As a result, Essex boy Ryan Cleary is facing multiple charges on both sides of the Atlantic for hacking offences. Information Monsegur provided also earned a 30 month jail term for James Jeffery after he hacked some British Pregnancy Advisory Service data.

The court documents don’t specify if Sabu is still actively helping with new investigations or just clearing up the old ones. Given the length of the sentence hanging over him, the US government is going to want its money's worth – so maybe, in time, he'll imitate fraudster Frank Abagnale on the conference circuit. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.