Hackers declare open season on government websites

Hacker groups call for stealing, leaking classified information

The hacker groups LulzSec and Anonymous are teaming up to launch attacks on government websites with the intent of stealing and leaking classified information, and are enlisting any like-minded brethren to do the same.

LulzSec announced what it’s calling Operation Anti-Security in a statement June 19 that employed a metaphor of naval warfare on the “Internet ocean.”

“We encourage any vessel, large or small, to open fire on any government or agency that crosses their path,” the statement read. “We fully endorse the flaunting of the word ‘AntiSec’ on any government website defacement or physical graffiti art. We encourage you to spread the word of AntiSec far and wide, for it will be remembered.”

To date, LulzSec and Anonymous have appeared to operate independently of each other, but LulzSec’s statement said it is teaming up with Anonymous for AntiSec, and Anonymous confirmed the alliance via Twitter, PC World reported.

LulzSec and Anonymous have attracted attention recently for a series of attacks on government websites, including LulzSec’s hacks on the websites of the Senate, CIA and the Atlanta chapter of the FBI-affiliated InfraGard, as well as on commercial sites.

Anonymous also has carried out attacks on foreign government websites; recently, 32 members of Anonymous were arrested in Turkey and three were arrested in Spain. Sony also has claimed that a distributed denial-of-service attack by Anonymous contributed to a hack of its PlayStation Network that netted personal information on more than 100 million users and shut down the network for an extended stretch. 

Despite its successful attacks on government websites, LulzSec’s efforts so far have seemed fairly benign, mostly intended to expose lax security on those sites without doing any real damage. But that could change, according to its statement.

“Top priority is to steal and leak any classified government information, including e-mail spools and documentation,” according to the statement. “Prime targets are banks and other high-ranking establishments.”

Even relatively harmless attacks are worrisome to security experts, however, because they underscore an advantage attackers have over network defenses. Charles Dodd, chief technology officer of Nicor Global, told GCN’s William Jackson “It might be benign, but it shows they have no fear of anyone coming after them. These guys are making a very powerful statement to the rest of the world.”

About the Author

Kevin McCaney is a former editor of Defense Systems and GCN.

Featured

  • Congress
    Rep. Jim Langevin (D-R.I.) at the Hack the Capitol conference Sept. 20, 2018

    Jim Langevin's view from the Hill

    As chairman of of the Intelligence and Emerging Threats and Capabilities subcommittee of the House Armed Services Committe and a member of the House Homeland Security Committee, Rhode Island Democrat Jim Langevin is one of the most influential voices on cybersecurity in Congress.

  • Comment
    Pilot Class. The author and Barbie Flowers are first row third and second from right, respectively.

    How VA is disrupting tech delivery

    A former Digital Service specialist at the Department of Veterans Affairs explains efforts to transition government from a legacy "project" approach to a more user-centered "product" method.

  • Cloud
    cloud migration

    DHS cloud push comes with complications

    A pressing data center closure schedule and an ensuing scramble to move applications means that some Homeland Security components might need more than one hop to get to the cloud.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.