Categories: SecurityWorkspace

LulzSec Claims Hack Of Military Dating Website

LulzSec has returned despite the recent arrest of five alleged members, and is claiming responsibility for breaking into the database for a website for single members of the military over the weekend.

According to a post on the blog site Pastebin.com 25 March, hackers using the names “LulzSec” and “LulzSecReborn” said they had broken into the site MilitarySingles.com and stolen data (including passwords and email addresses) from almost 171,000 accounts.

Hacked Or Not?

“The website http://www.militarysingles.com/ was recently closed day ago or so, so we dumped email db,” the message in the blog post said. “There are emails such as @us.army.mil; @carney.navy.mil; @greatlakes.cnet.navy.mil; @microsoft.com; etc. …”

The hack was noted on the Website Databreaches.net. However, in a response to the post, officials with eSingles, which owns MilitarySingles.com, said they were aware of the claim and were investigating the situation.

However, they added: “At this time, there is no actual evidence that MilitarySingles.com was hacked, and it is possible that the Tweet from Operation Digiturk is simply a false claim.” They said they were treating the claim as real.

Operation Digiturk first reported the hack over the weekend.

The Databreaches.com site questioned eSingles’ reaction.

“Care to define ‘actual evidence?'” according to the Databreaches.com response. ” I compared the database in the .rar file to the ‘online members’ pictured on your home page and the entries in the data dump correspond to those user names.”

Hacker Arrests

The attack on the singles site comes three weeks after law enforcement officials in the United States and Europe arrested five people suspected of being members of LulzSec, a hacker group that during a 50-day period last year attacked government and corporate Websites and stole data. Among the alleged victims were the CIA, the US Senate and Sony.

The high-profile arrests generated headlines, particularly after it was learned that the break in the case came in August 2011, when authorities arrested Xavier Monsegur, a 28-year-old New York City resident and alleged leader of LulzSec. According to law enforcement officials, Monsegur, who used the online name “Sabu” in his work with LulzSec, cooperated with authorities in hopes of getting a reduced sentence and helped lead to the arrests of the five people 6 March.

The arrests also drew the ire of the hacker collective Anonymous, which launched its own attacks in retaliation against such groups as data security firms Panda Security and Symantec, as well as New York Ironworks, a company that sells equipment and gear to the New York City Police Department.

How well do you know Internet security? Try our quiz and find out!

Jeffrey Burt

Jeffrey Burt is a senior editor for eWEEK and contributor to TechWeekEurope

Recent Posts

UK’s CMA Readies Cloud Sector “Behavioural” Remedies – Report

Targetting AWS, Microsoft? British competition regulator soon to announce “behavioural” remedies for cloud sector

9 hours ago

Former Policy Boss At X Nick Pickles, Joins Sam Altman Venture

Move to Elon Musk rival. Former senior executive at X joins Sam Altman's venture formerly…

11 hours ago

Bitcoin Rises Above $96,000 Amid Trump Optimism

Bitcoin price rises towards $100,000, amid investor optimism of friendlier US regulatory landscape under Donald…

13 hours ago

FTX Co-Founder Gary Wang Spared Prison

Judge Kaplan praises former FTX CTO Gary Wang for his co-operation against Sam Bankman-Fried during…

13 hours ago