LulzSec continues targeted attacks against Sony and responds to blackmail claims by Unveillance

News by Dan Raywood

The online assault by hacking group LulzSec continued over the past 24 hours, with new attacks made on the Sony BMG website and computer entertainment developer network.

The online assault by hacking group LulzSec continued over the past 24 hours, with new attacks made on the Sony BMG website and computer entertainment developer network.

Stating that this was its fifth attack on Sony, LulzSec seized a 54MB Sony developer source code which it published, available for download on its website. It followed this with a new attack on Sony BMG, with an internal network map also published.

In a statement, LulzSec said: “We've recently bought a copy of this great new game called ‘Hackers vs. Sony', but we're unable to play it online due to PSN being obliterated. So we decided to play offline mode for a while and got quite a few trophies. Our latest goal is ‘Hack Sony five times', so please find enclosed our fifth Sony hack.

“Achievement unlocked: hack Sony six times! Oh damn, we just did it again, please also find enclosed internal network maps of Sony BMG.”

The group has also responded to claims of blackmail made by Unveillance CEO Karim Hijazi. He said he had been targeted by LulzSec for two weeks, in which time he was ‘personally contacted by several members of this group who made threats against me and my company to try to obtain money'.

He said: “Plain and simple, I refused to comply with their demands. Because of this, they followed through in their threats and attacked me, my business and my personal reputation. I believe this incident shows the true nature of LulzSec.”

In response, LulzSec claimed that Hijazi was blatantly trying to hide his incompetence and attempting to paint an ill-conceived picture on LulzSec.

It said: “To clarify, we were never going to extort anything from you. We were simply going to pressure you into a position where you could be willing to give us money for our silence and then expose you publicly.

“Ironically, despite the fact that you A) claimed that you wouldn't do something like that, and B) foolishly got outsmarted yet again, we'd like to point out something that you did do: attempt to cooperate with mystery hackers in order to radically and illegally, boost your company from the ground.”

It went on to say that Hijazi ‘attempted from the start to work with us for his own gain' and offered LulzSec payment for certain malicious tasks, including destroying Hijazi's competitors through insider information and holes he would supply, as well as tracking ‘enemy' botnets and ‘enemy' botnet trackers, ‘all in return for our silence and mutual gain'.

“While it's normal for him to try and cover up this embarrassment by putting all the focus back on us, we can, again, see past this primitive social engineering. Hijazi compromised his entire company and the personal lives of his colleagues, and then attempted to silence us with promises of financial gain and mutual benefits,” it said.

“We don't need cleverly-crafted media spinning to cover up anything, we say it how it is, nice and loud: Hijazi is a giant f***wit that used the same password for all of his online accounts and all accounts linked to a company he owns. Then he tried to bargain with hackers so his company wouldn't crumble. Try harder, Hijazi. We're too smart for your silly games.”

At the time of writing there was no response from Unveillance or Karim Hijazi.


Find this article useful?

Get more great articles like this in your inbox every lunchtime

Video and interviews