LulzSec

Joepie91

IRL Name: 
Sven Slootweg
Biography: 

The founder of the Cryto Coding Collective, Joepie91 was associated with LulzSec, but no evidence was surfaced that he was involved in any hacks done by the group (or even actually a member of the group). In 2011, his information was leaked by TeaMp0isoN, iN^SaNe and TriCk on Twitter and his personal page was defaced. In July 2013, Joepie was raided by the police and his hardware was seized. However, he was not arrested in this raid.

Pictures: 
References

Aush0k

IRL Name: 
Matthew Trevor Flannery
Biography: 

A 24 year old overnight IT help desk assistant at Content Security in North Ryde, Sydney Australia, Flannery was tasked to help and provide advice to US clients. He was part of Lulzsec that also claimed credit for the attacks on the CIA and UK's Sun newspaper. He has been caught gaining unauthorized access as well as altering restricted data on Narrabri Shire Council's website. He uploaded a file which disrupted the site's function. He could face 12 years in prison if charged with this felony.

References

Recursion

IRL Name: 
Cody Andrew Kretsinger
Biography: 

Cody Andrew Kretsinger is a Former Lulzsec member who was arrested for allegedly carrying out the summer attacks against Sony Pictures on behalf of LulzSec. Authorities apparently hunted down Kretsinger through the U.K.-based HideMyAss proxy server service provider he used to help him “anonymously” carry out his SQL injection attack against Sony. The provider coughed up the logs to the authorities that allowed them to match time-stamps with IP addresses to pinpoint Kretsinger as the suspect in question.

Pictures: 
References

neuron

IRL Name: 
Raynaldo Rivera
Biography: 

Raynaldo Rivera a 20 year-old of Tempe, Arizona is a member of Lulz Sec. He stole information from Sony Pictures computer systems in May and June of 2011 using an "SQL injection" against the Sony website. He also played a role in the SPE attack from which thousands of Sony users information were released online. He covered his tracks by using a variety of pseudonyms including "neuron", "royal" and "wildicv". He also used a proxy server to further avoid detection. He was studying computer science at the University of Advancing Technology according to his Facebook page.

Pictures: 
References

Ryan Clearly

IRL Name: 
Ryan Clearly
Biography: 

Ryan Cleary is from Essex, United Kingdom who was arrested by Metropolitan Police on June 21 2011 and charged with violating the Computer Misuse Act and the Criminal Law Act 1977. He was accused of being a member of LulzSec but was not a member of the said group although he admitted that he did run one of the IRC channels that they used for communicating. He also faces prosecution of joining other members of LulzSec in using hacked computers, known as a "botnet", to steal confidential information, deface websites or attack servers.

Pictures: 
References

Anarchaos, Ghost, POW, sup_g, yohoho, tylerknowsthis, crediblethreat

IRL Name: 
Jeremy Hammond
Biography: 

Jeremy Hammond (born December 1985) is a political activist from Chicago charged in a criminal complaint with crimes relating to the December 2011 hack of Strategic Forecasting, Inc. (Stratfor). He conspired with other members of Anonymous off-shoot AntiSec to breach Stratfor’s emails and steal approximately 60,000 credit card numbers wherein the cc's were used to make over $700,000 in fraudulent charges.

Pictures: 
References

pwnsauce, raepsauce, networkkitten

IRL Name: 
Darren Martyn
Biography: 

People who know Mr Martyn describe him as a quiet, shy, highly intelligent man who has always had an interest in computers. He has been honoured with awards in the past for his science and technology skills at Calasanctius College, where he completed his Leaving Certificate two years ago. His mother Lisa works in the Claregalway Naíonra and his father, Anthony, is a mechanic. They were described by locals yesterday as a “lovely, decent family”.

All posts were deleted from Mr Martyn’s ‘wall’ on social networking site Facebook on Tuesday night but his lists of activities remain, including ‘Hacking Computers’, ‘Ethical Hacking’ and ‘Lock Picking’. He lists as his employers, ‘Resident Pirate’ at Nyan Cat. There are also pictures uploaded on his Facebook page, apparently showing how to intercept emails and hack websites.

He is reported to have taken to the internet Tuesday night to say he was a “reformed hacker” and that he was “bloody frightened” by the FBI investigation.

The indictment makes accusations that hacking group members:
* Compromised an FBI computer.
* Hacked US security firms HBGary Inc and its affiliate HBGary Federal, and stole confidential data relating to thousands of user accounts.
* Stole confidential data relating to more than 70,000 potential contestants on The X Factor, a Fox television show.
* Attacked the website of US network PBS and stole personal information of 2,000 employees and other individuals before making the information public.

Pictures: 
References

Kayla, KMS, Shockofgod

IRL Name: 
Ryan Ackroyd
Biography: 

Ryan Ackroyd, 25, from Mexborough, South Yorkshire, appeared in court on charges relating to the Lulzsec hacking of the CIA and the UK's Serious Organised Crime Agency. He made no plea and will next appear at Southwark Crown court on 11 May. Mr Ackroyd is the last of four alleged members of online activists LulzSec, a spin-off of the loosely organised hacking collective Anonymous, to appear in court in Britain.

The indictment alleges the four individuals plotted together and with others to carry out so-called distributed denial of service (DDoS) attacks. They were accused of launching DDoS attacks on the Serious Organised Crime Agency, the CIA, News International, Sony, US computer game firm Bethesda, web-based game Eve Online and the fundamentalist Westboro Baptist Church in Kansas, US. The four are also charged with conspiring to hack into computers operated by the NHS, News International, Sony, Nintendo, film studio 20th Century Fox, US public broadcaster PBS, and US computer security organisations HBGary, Black & Berg and Infraguard.

References

Topiary

IRL Name: 
Jake Davis
Biography: 

Jake Davis, an 18-year old man suspected of being "Topiary" was arrested in the Shetland Islands on July 27, 2011. On July 31, 2011, the man was charged with five offences including unauthorised computer access and conspiracy to carry out a distributed denial of service attack on the Serious Organised Crime Agency's website. Scotland Yard later identified the man arrested as Yell, Shetland resident Jake Davis. He was charged with unauthorized access of a computer under the Computer Misuse Act 1990, encouraging or assisting criminal activity under the Serious Crime Act 2007, conspiracy to launch a denial-of-service attack against the Serious Organised Crime Unit contrary to the Criminal Law Act 1977, and criminal conspiracy also under the Criminal Law Act 1977.

Police confiscated a Dell laptop and a 100-gigabyte hard drive that had 16 different virtual machines. The hard drive also contained details relating to an attack on Sony and hundreds of thousands of email addresses and passwords were found on the computer. A London court released Davis on bail under the conditions that he live under curfew with his mother and have no access to the Internet. His lawyer Gideon Cammerman stated that, while his client did help publicize LulzSec and Anonymous attacks, he lacks the technical skills to have been anything but a sympathizer.

Pictures: 
References

Sabu

IRL Name: 
Hector Xavier Monsegur
Biography: 

Sabu was a computer hacker and ringleader of the Anonymous offshoot group LulzSec. He was an unemployed computer hacker that lost his job at Limewire after it got hit with multiple lawsuits for copyright infringement. He received welfare and was the legal guardian of two young children. Prior to forming LulzSec he was a part of another collective called Internet Feds which was affiliated with Anonymous. He helped in an incident which e-mails were stolen from HBGary accounts. He helped in leaking passwords, altering several employees' Linkedln profiles and leaking a database of X Factor contestants containing contact information of 73,000 contestants. They claimed responsibility for several high profile attacks, including the compromise of user accounts from Sony Pictures in 2011. They also took down the CIA website offline. Now he is helping the FBi track down and gather evidence against his associates, tweeting misinformation and protecting the CIA among other government and financial institutions from hackers. He was charged with aggrevated identity theft and a two-year prison sentence to hang over his head if he did not help the FBI or CIA. They bribed him with his kids by telling him if he cooperated he can be with them. He pleaded guilty in August 11, 2011 to more than ten charges relating to his hacking activity. He did help take down the other high-level members of LulzSec and Anonymous. The FBI has provided him with a PC laptop to help take down other members. He currently works with the government to protect and prevent assault from hackers.

Pictures: 
References
Syndicate content