LulzSec police raid turns up mystery Kayla insider
An FBI raid newly publicized Tuesday may have given clues as to some actual identities but at the cost of a person's well-being. The search, conducted against chatroom participant but otherwise believed innocent Laurelai Bailey, has narrowed down one member to a mystery figure known as "Kayla." The FBI was "particularly interested" whenever Kayla was mentioned, Bailey tells Gawker, but gives little away even with a reported Twitter account.
LulzSec hints IDs real but payload still waiting
A Sunday interview with an unnamed LulzSec member has reportedly validated talke of exposed identities but also given the group a bargaining chip. The source's conversation with the AP maintained that at least some of the personal info was real and a "distraction." He was considering getting out of hacking altogether, although he suggested that support of the AntiSec political movement would lead some to contribute to Anonymous.
LulzSec stops official campaign
Lulz Security on Saturday said it was quitting its hacks as an official collective after 50 days of hacks. The group said its "planned" campaign had come to an end and was encouraging others to take its place. Some of the hacks were launched just for fun, the group said, but it hoped the AntiSec (anti-security) campaign would go on to foster resistance to excessive political control.
LulzSec quickly dampens rumors of UK trouble
Lulz Security quickly shot down any claims that it had been embroiled in UK trouble. The hacker collective argued that reports of the hack were "fake" and that its Twitter account was the authority. Everyone in the group was accounted for, it added, leaving any UK arrests to either unrelated cases or innocents.
Sega Pass next in wave of game related hacks
Sega on Friday in a warning to gamers said that its Sega Pass online service had been hacked. It took down the service after discovering that the database had been compromised. Those at PlayStation Lifestyle and elsewhere had been told that e-mail addresses and encrypted passwords had been compromised.
Nintendo reports its own hacking incident
Lulz Security switched targets on Sunday and said it had attacked Nintendo's servers. The team successfully grabbed Nintendo's webserver configuration file and posted it online as proof. On Twitter, the group was emphatic that it "didn't mean any harm" with this breach and that Nintendo had already fixed the hole by the time it had gone public.
Lulz Security hits Sony again in security message
Sony was embarrassed again on Thursday after Lulz Security posted that it had successfully hacked Sony Pictures' website. It lived up to its earlier promise and used a basic SQL injection attack to expose one million users' personal data, 3.5 million digital coupons and 75,000 music codes. The hacking team found that the information had few defenses and that none of the data, even including passwords, were stored in clear text.
LulzSec plans new wave of Sony hacking
Hacking collective Lulz Security teased on Sunday that it was about to launch a fresh campaign against Sony "within the next day." Following attacks on Sony Music Japan and elsewhere, the first phase of "Sownage" (Sony ownage) was coming along with a "pre-game show." As expected, the group didn't name its targets other than some Sony websites.