Access member only content, take part in discussions with comments on blogs, news and reviews and receive all the latest security industry news directly to your inbox. Join now for free.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can start posting.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain @scmagazine.com.au to your white-listed senders.
Hackers calling themselves "LulzSec Reborn" have claimed responsibility for two breaches that resulted in the dumping of personal information.
The attackers on Sunday exposed the email account information, including names, usernames, passwords and IP addresses, belonging to some 170,000 members of MilitarySingles.com, an online dating website, according to a Pastebin document. The site remains operational, but apparently to show proof of their hack, the intruders defaced at least one page on the site, which is still reachable.
A spokesperson at the company that owns MilitarySingles, ESingles Inc., did not respond to a request for comment. But someone claiming to be an administrator posted a comment on the DataBreaches.net website, which chronicles information loss incidents, and said it's possible the breach claim was "false" but that it would investigate.
More spilled information, including private messages shared among members of the site, could be on the way, according to a tweet Tuesday from "Operation Digiturk," which appears to be affiliated with Anonymous in Turkey.
Meanwhile, LulzSec Reborn on Monday also has announced, via another Pastebin post, that it hijacked the database belonging to CSS Corp, a technology solutions provider. The hackers claimed to have ripped off the names, phone numbers, usernames and passwords of users.
It appears unlikely that the person or group responsible for these two hacks was part of the original LulzSec, which closed up shop last June and whose members have been arrested since then.
This article originally appeared at scmagazineus.com
To begin commenting right away, you can log in below or register an account if you don't yet have one. Please read our guidelines on commenting. Offending posts will be removed and your access may be suspended. Abusive or obscene language will not be tolerated. The comments below do not necessarily reflect the views or opinions of SC Magazine, Haymarket Media or its employees.