This article was published on June 26, 2011

What’s inside LulzSec’s final data dump

What’s inside LulzSec’s final data dump
Martin Bryant
Story by

Martin Bryant


Martin Bryant is founder of Big Revolution, where he helps tech companies refine their proposition and positioning, and develops high-qualit Martin Bryant is founder of Big Revolution, where he helps tech companies refine their proposition and positioning, and develops high-quality, compelling content for them. He previously served in several roles at TNW, including Editor-in-Chief. He left the company in April 2016 for pastures new.

As we reported earlier, LulzSec says that it has bowed out of the limelight for good after fifty days of headline-grabbing hacking of corporate and governmental targets. Along with its final statement, it released a data dump including a wide range of information. We’ve downloaded it, so what’s inside?

We’re not going into details here, simply providing an overview of what LulzSec has released.

AOL: While you may have been secretly hoping for some juicy memos akin to The AOL Way, what we actually have is a text file that begins: “The purpose of this document is to provide the AOL Network Engineering Staff, Management and any other pertinent persons a detailed review, analysis and recommended ‘best practices’ document for the implementation of layer 4 through 7 switching configurations.” – it’s an incredibly technical document.

AT&T: A large .rar archive includes a huge number of internal documents related to AT&T’s LTE rollout. It includes meeting memos, emails, media reports, PDFs, Powerpoint presentations and more.

Battlefield Heroes: This text file appears to be a list of account details for over 550,000 users of social game Battlefield Heroes.

FBI Being Silly: This text file includes the output of a URL on the FBI website. We’ll admit to not knowing the technical significance of why this is ‘silly’ as yet. This appears to be 200,000 user details for in a .csv file. Similarly, this appears to be 220,000 user logins for a NATO online bookshop (the URL currently redirects to the main NATO site).

Evidence that LulzSec hacked the US Navy website: An image is included showing the phrase “Pablo Escobar AntiSec” inserted multiple times on a list of Navy salary grades.

Office networks of corporations: A text file seemingly listing IP numbers of  internal Corporate networks, including Disney, EMI and Universal.

Email login details supposedly for a number of private investigators: Self-explanatory.

User login details for “Random gaming forums”: It’s unclear which forums.

“Silly routers”: A list of IP numbers for routers with passwords set to either ‘root’ or ‘admin’.

So there we go – that’s our first parse through. No doubt any significant information within the dump will be explored in more depth as it is uncovered.