As we reported earlier, LulzSec says that it has bowed out of the limelight for good after fifty days of headline-grabbing hacking of corporate and governmental targets. Along with its final statement, it released a data dump including a wide range of information. We’ve downloaded it, so what’s inside?
We’re not going into details here, simply providing an overview of what LulzSec has released.
So. Much. Tech.
Some of the biggest names in tech are coming to TNW Conference in Amsterdam this May.
AOL: While you may have been secretly hoping for some juicy memos akin to The AOL Way, what we actually have is a text file that begins: “The purpose of this document is to provide the AOL Network Engineering Staff, Management and any other pertinent persons a detailed review, analysis and recommended ‘best practices’ document for the implementation of layer 4 through 7 switching configurations.” – it’s an incredibly technical document.
AT&T: A large .rar archive includes a huge number of internal documents related to AT&T’s LTE rollout. It includes meeting memos, emails, media reports, PDFs, Powerpoint presentations and more.
Battlefield Heroes: This text file appears to be a list of account details for over 550,000 users of social game Battlefield Heroes.
FBI Being Silly: This text file includes the output of a URL on the FBI website. We’ll admit to not knowing the technical significance of why this is ‘silly’ as yet.
Hackforums.net: This appears to be 200,000 user details for Hackforums.net in a .csv file.
Nato-bookshop.org: Similarly, this appears to be 220,000 user logins for a NATO online bookshop (the URL currently redirects to the main NATO site).
Evidence that LulzSec hacked the US Navy website: An image is included showing the phrase “Pablo Escobar AntiSec” inserted multiple times on a list of Navy salary grades.
Email login details supposedly for a number of private investigators: Self-explanatory.
User login details for “Random gaming forums”: It’s unclear which forums.
“Silly routers”: A list of IP numbers for routers with passwords set to either ‘root’ or ‘admin’.
So there we go – that’s our first parse through. No doubt any significant information within the dump will be explored in more depth as it is uncovered.