p>Hack attack on Sony and Xbox

/p>

p>20 January 2015

/p>

p>Lizard Squad hacking group was hit by embarrassing attack that exposed its entire database of users.

/p>

p>The group claimed to have taken off the PlayStation and Xbox gaming networks over Christmas.

/p>

p>After that, it set up a website that allowed anyone who paid use its software to flood other sites with information.

/p>

p>The attack which exposed the customer list is one of several aimed at the group and its tools.

/p>

p>Address list

/p>

p>Investigative journalist Brian Krebs broke the news that the database behind the Lizard Stresser tool had been compromised. The Stresser let users who paid make use of it to overwhelm websites or shut down users by bombarding websites they were using with their personal data.

/p>

p>Mr. Krebs did not reveal who got at the data but said he had acquired an archive of the complete list of 14,241 individuals who had signed up.

/p>

p>Anyone visiting the Stresser site was warned about the attack through a text message on the login page's main page that advised users to change their passwords they used when they signed up.

/p>

p>In a blog post the author Krebs stated that the Lizard Squad had not taken numerous precautions to safeguard the login and contact details surrendered by users.

/p>

p>Krebs said that all registered usernames and passwords were stored in plain text, noting that just a handful of users had paid for it.

/p>

p>Tech news site Ars Technica also obtained the database dump, which was published on the Mega file-sharing platform. It stated that the majority of those who used it were gamers looking to stop rivals playing the same game. Minecraft servers were a favorite target of the Stresser users according to the report.

/p>

p>Ars Technica said the dump of the database could spell issues for anyone who used it because the IP addresses of many of them were not properly obscured and could, with a bit of effort, be recovered.

/p>

p>The plundering of the database comes shortly after other computer experts took apart the tools Lizard Squad has been using. https://igralni.com/ One of the hackers exposed the source code of the program used to attack IRC chat network users.

/p>

p>In addition, shortly after the website was created computer science student Eric Zhang managed to enumerate the names of all the users who had registered with a very basic script.

/p>

p>He stated, "That took only 10 minutes."

/p>

p>He said he wasn't surprised that the entire database had been plundered because when he checked the website, access for the public to the server behind it had not been blocked.

/p>

p>He claimed that the site was run by a person who had no formal knowledge of software engineering.

/p>

p>He said, "Most of their work is not very impressive." "Anyone can accomplish this. All it takes is time."

/p>

p>Mr. Krebs stated that Lizard Squad was being targeted because security officers were dissatisfied by their sudden fame.

/p>

p>He added: "There seems to be a general sense in the security research community that these people are in way over their heads, and should we not bring to justice a bunch of teens in Western nations who are rubbing it in everyone's faces, then that's a sad situation."

/p>

p>He said that the group was able to survive because of the time it took for investigations to be conducted and the members to be identified. Recent arrests of Lizard Squad members seemed only to have scooped up some of its hangers-on , but let a few core members remain at large.

/p>

p>UK man is arrested in connection with Sony hack

/p>

p>16 January 2015

/p>

p>Sony hackers 'shared' stolen logins

/p>

p>30 December 2014

/p>

p>PlayStation rebuild service

/p>

p>27 December 2014

/p>

p>Brian Krebs

/p>

p>Eric Zhang

/p>


トップ   編集 凍結 差分 バックアップ 添付 複製 名前変更 リロード   新規 一覧 単語検索 最終更新   ヘルプ   最終更新のRSS
Last-modified: 2022-09-16 (金) 01:22:07 (594d)