Feeds

Sabu wasn't the only FBI mole in LulzSec, suggest leaked docs

Obvious question: who WAS the second snitch?

High performance access to file storage

Leaked search warrants suggest Sabu wasn't the only LulzSec hacker who helped the FBI take down the infamous hacktivist group.

The unredacted search warrants for ‪Sabu‬ and ‪LulzSec‬ refer to involvement of three different informants in the investigation, at least two of whom it is implied were members of the organisation.

Information from both Hector Xavier “Sabu” Monsegur and another unnamed internal mole were instrumental in supplying information that allowed Feds to acquire warrants against other LulzSec and Anonymous suspects. The two informants are referred to in the documents as CW-1 (confidential witness-1) and CW-2.

Sabu started helping the FBI following his arrest in June 2011. The documents don't reveal the name of the second informant, but the Daily Dot suggests this party might have been subjected to arrest in Ohio in June 2011 prior to informing on British LulzSec member Ryan Cleary, as well as implicating Ryan “Kayla” Ackroyd in a December 2010 hack against Gawker.

A Twitter update from around this time from LulzSec denouncing "M_nerva" for helping the Feds supports this theory.

One of 12 leaked documents (PDF) provides justification for a search warrant against a Facebook profile, “lesmujahideen”, linked to Monsegur. At the time of the warrant on 7 June 2011, the Feds already had Monsegur's IP address, linking illegal actions online back to an internet connection in a New York apartment. Investigators made this crucial IP address link in April 2011, earlier than previously publicly suspected.

The leaked documents (here on pastebin) are mirrored here and through a Dropbox account here.

LulzSec, for those who need a quick recap, was an infamous hacking crew that ran riot across the web during its "50 days of Lulz" between May and June 2011. Its victims included Fox, Sony, FBI-affiliated security outfits such as Infragard and HB Gary Federal, the US Senate, the Arizona State Police, the CIA and the UK's Serious Organised Crime Agency.

Most targets were entertainment firms opposing file-sharing, information security outfits it wanted to embarrass, or law enforcement agencies. Tactics ran from basic website-flooding attacks to defacement and site redirection. In some cases the group published stolen data from compromised websites.

Monsegur frequently acted as the group's ideologue as well as directing attack campaigns. He was the main man in a group that was nominally leaderless. He has already pleaded guilty to 12 counts of hacking, bank fraud, and identity theft but his sentencing has repeatedly been delayed.

Three British members of the notorious LulzSec hacktivist crew and a hacker affiliate were convicted of hacking offences and sentenced last May. The youngest of the four avoided prison while the other three were sentenced to between 24 to 32 months behind bars.

Other related arrests and prosecutions have taken place in the US and Ireland.

Another hacking suspect – Jeremy Hammond (AKA Anarchaos), 29, of Chicago, Illinois, received a far tougher sentence. Hammond was jailed for 10 years for a hack on security intelligence outfit Stratfor that took place in December 2011. As many as 60,000 credit card numbers stolen as part of the hack were used to make fraudulent donations to worthy causes.

Monsegur, acting as an FBI snitch at the time, tried to persuade the hackers who carried out the raid to store emails looted from Stratfor on a server controlled by the Feds. Information coaxed out of Hammond by Monsegur led directly to Hammond's arrest. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.