Lulz hackers say attacks are entertainment

SHARE:


WASHINGTON (AFP) – Computer hackers who have hit the websites of the CIA, US Senate, Sony and others during a month-long rampage said Friday that they were staging the attacks for their own entertainment.
"You find it funny to watch havoc unfold, and we find it funny to cause it," the hacker group known as Lulz Security said in a 750-word online "manifesto.""For the past month and a bit, we've been causing mayhem and chaos throughout the Internet, attacking several targets including PBS, Sony, Fox, porn websites, FBI, CIA, the US government, Sony some more, online gaming servers," Lulz said."While we've gained many, many supporters, we do have a mass of enemies, albeit mainly gamers," Lulz said, adding that they were not concerned.
"This is the lulz lizard era, where we do things just because we find it entertaining," said Lulz, whose name is a derivative of the text shorthand for LOL, or "laugh out loud.""This is the Internet, where we screw each other over for a jolt of satisfaction," the group said.
"We release personal data so that equally evil people can entertain us with what they do with it," Lulz said. "And that's all there is to it, that's what appeals to our Internet generation."We're attracted to fast-changing scenarios, we can't stand repetitiveness, and we want our shot of entertainment or we just go and browse something else, like an unimpressed zombie," Lulz said.The group said it will "continue creating things that are exciting and new until we're brought to justice, which we might well be."Lulz has released tens of thousands of user names and passwords in recent weeks but the group said Friday they were "sitting on" the personal information of 200,000 users of the Brink videogame. It might make you feel safe knowing we told you, so that Brink users may change their passwords," Lulz said.On Wednesday, Lulz knocked the CIA's public website, cia.gov, out of commission for about two hours.Lulz, in a message on their Twitter feed @LulzSec on Friday, also denied reports that they were in conflict with the hacker group Anonymous, from which Lulz is believed to have formed."To confirm, we aren't going after Anonymous," Lulz said.Anonymous has been staging cyberattacks for years on companies cracking down on music and movie piracy and gained notoriety last year with cyberattacks in support of controversial website WikiLeaks.

COMMENTS

Name

4G,1,A/B Testing,2,Aerospace Engineering,2,AFP Consortium,1,Agile,2,AI,5,amazon,4,Amazon india coupons,3,AMD,1,Analytics,2,android,28,android phones,2,Anonymous,3,Antivirus,1,app,24,App Development,6,apple,32,apps,5,Artificial Intelligence,8,Assurance,1,asus,1,Audi,2,auto,7,automation,2,automation software,11,automotive technology,11,banking,1,Big data,2,bitcoin,3,BlackBerry,5,blockchain,4,blogging,1,BMW,1,branding,1,brands,2,browser,2,Business,18,Business Analytics,2,Business Intelligence,1,Business lesson,18,Business models,6,business strategy,24,Business Strategy Model,16,Business Success Story,7,business techniques,24,cameraphone,5,car,15,car technology,11,CES,1,chromebook,3,Cloud computing,6,cloud Technology,5,CMS,1,coding,1,companies,3,Consortium,1,consulting,1,content marketing,9,corporate,1,coupons,3,CRM,2,CRM Software,3,cryptocurrency,2,Customer experience,8,Customer Service,7,customer support,4,cyber crime,5,cyber security,27,data,3,data recovery,1,deals,1,Dell Streak,1,development,9,devices,2,DevOps,1,digital currency,1,digital marketing,23,Digital Transformation,2,disk,1,e commerce,1,eBay,1,ebook,1,ecommerce,8,Electric Cars,11,electronics sale,2,elon musk,2,email,1,energy,1,enterprise,11,Enterprise Security,2,enterprise technology,9,entrepreneur,3,entrepreneurship,7,ERP,2,facebook,24,file conversion,1,financial tech,1,fintech,1,firefox,2,firefox os,2,Flipkart,2,Front-end Development,3,future business,10,future technology,34,gadget,33,gamail,1,games,6,Games.,1,google,20,google cars,1,google glass,3,Google I/O,1,Google+,8,goole ranking,1,Graphics Card,1,Green energy,1,hackers,18,hacking,14,hardware,5,Healthcare,1,HealthTech,1,Home Automation,1,Hosting,3,How To Guides,22,How Tos,17,icloud,3,IDE,1,Infographic,2,Information Technology,19,infosec,14,innovation,52,internet,8,Internet Explorer,1,Internet of Things,8,Inventory Management,1,ios,18,IoT,10,ipad,8,iPhone,14,iPhone 8,1,IT certification,1,IT Operation,1,IT Service,2,IT services management,3,ITSM,2,iWatch,1,Jabong,1,JavaScript,4,JS,1,Kubernetes,1,laptop,3,LinkedIn,2,local business,1,Lotus Notes,3,MacBook,3,mackbook air,2,Magento,1,Managed IT Services,3,Mark Zuckerberg,4,Mercedes,1,messenger,1,microsoft,6,mobile app development,28,mobile apps,30,mobile broadband,1,mobile enterprise,15,mobile recharge,2,mobility,18,mobility management,11,Motorola Xoom,1,Myntra,1,network,4,nokia,1,NSA,2,Nvidia,1,Objective-C,1,Omnichannel,1,OnePlus Smartphones,1,online course,1,online education,2,online recharge,1,online shopping,4,open source,1,opreating system,5,Outlook,2,P2P,1,page ranking,1,patent,1,Payment,1,PayTM,1,pc software,1,photoshop,1,playstation,1,Porsche,1,process management,4,Procure,1,programming,4,programming language,5,Python,1,Quality,2,Redbus,1,remote control,1,renewable energy,3,review,10,SAAS,4,sales,2,Sales Funnel,2,samsung,7,scrum,1,search engine,4,Search Engine Optimization,2,security,15,Self Driving Cars,11,SEO,9,smartphone,14,SmartTech,1,SME,1,sms,1,Snapdeal,2,social media,12,social network,11,software,14,Software as a service (SaaS),5,software development,17,software methodology,8,Software Outsourcing,2,software review,4,Solar,1,Solar energy,1,Solar power,1,startup,10,steve jobs,3,storage,1,strategy,1,Supercars,1,sustainability,1,Swift,1,tablet,9,team management,3,tech,4,tech conference,1,Tech event,2,Ted talk,1,Tesla,2,Tesla Motors,3,The Internet Of Things,2,timeline,1,toolbar,1,tools,2,torrent,1,touchscreen,2,trdx,1,tutorial,2,twitter,3,udacity,1,udemy,1,ultrabook,1,USB,1,video,2,video editor,2,virtual phone,1,Virtual Reality,4,Volvo,2,VPN,3,VR,2,Wearable gadget,2,Wearable Tech,2,Web 4.0,3,Web Development,9,web technology,12,Wi-Fi,1,wikileaks,2,windows,7,windows 10,1,Windows 8,8,Windows 8 Preview,1,Wordpress,3,workplace,2,X Mountain Lion,2,xcode,1,xp,1,
ltr
item
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos: Lulz hackers say attacks are entertainment
Lulz hackers say attacks are entertainment
http://d.yimg.com/a/p/afp/20110617/capt.photo_1308339637959-1-0.jpg?x=400&y=297&q=85&sig=ZZmCms7GF8amGPybm2VOUg--
TechFond - Latest Technology | Analysis | Enterprise | Startups | Product Reviews | How Tos
https://www.techfond.in/2011/06/lulz-hackers-say-attacks-are.html
https://www.techfond.in/
https://www.techfond.in/
https://www.techfond.in/2011/06/lulz-hackers-say-attacks-are.html
true
6925568668654321940
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy