As we reported earlier, LulzSec says that it has bowed out of the limelight for good after fifty days of headline-grabbing hacking of corporate and governmental targets. Along with its final statement, it released a data dump including a wide range of information. We’ve downloaded it, so what’s inside?
We’re not going into details here, simply providing an overview of what LulzSec has released.
AOL: While you may have been secretly hoping for some juicy memos akin to The AOL Way, what we actually have is a text file that begins: “The purpose of this document is to provide the AOL Network Engineering Staff, Management and any other pertinent persons a detailed review, analysis and recommended ‘best practices’ document for the implementation of layer 4 through 7 switching configurations.” – it’s an incredibly technical document.
ATT: A large .rar archive includes a huge number of internal documents related to ATT’s LTE rollout. It includes meeting memos, emails, media reports, PDFs, Powerpoint presentations and more.
Battlefield Heroes: This text file appears to be a list of account details for over 550,000 users of social game Battlefield Heroes.
FBI Being Silly: This text file includes the output of a URL on the FBI website. We’ll admit to not knowing the technical significance of why this is ‘silly’ as yet.
Hackforums.net: This appears to be 200,000 user details for Hackforums.net in a .csv file.
Nato-bookshop.org: Similarly, this appears to be 220,000 user logins for a NATO online bookshop (the URL currently redirects to the main NATO site).
Evidence that LulzSec hacked the US Navy website: An image is included showing the phrase “Pablo Escobar AntiSec” inserted multiple times on a list of Navy salary grades.
Office networks of corporations: A text file seemingly listing IP numbers of internal Corporate networks, including Disney, EMI and Universal.
Email login details supposedly for a number of private investigators: Self-explanatory.
User login details for “Random gaming forums”: It’s unclear which forums.
“Silly routers”: A list of IP numbers for routers with passwords set to either ‘root’ or ‘admin’.
So there we go – that’s our first parse through. No doubt any significant information within the dump will be explored in more depth as it is uncovered.
Article source: TNW http://feedproxy.google.com/~r/TheNextWeb/~3/abgkLBUO9cA/