LulzSec targets EVE Online, Minecraft, Escapist, League of Legends [Update]
LulzSec, the hacker group behind a string of recent attacks on game companies, has now targeted EVE Online, Minecraft, and the gaming Web site The Escapist. Minecraft is back online, but the other two remain down.
[Update] The group has now targeted League of Legends, bringing down the login servers and (apparently inadvertently) the Web site. The group says this "concludes" today's DDOS attacks, but we'll keep an eye out for any more shenanigans.
[Original Story] Hot off the heels of yesterday's Bethesda attacks, hacker group LulzSec has targeted more online games and even a gaming site. The group has claimed responsibility for attacks today against EVE Online, Minecraft, and gaming site The Escapist.
EVE Online was the apparent victim of a DDOS attack, which wiped out both the login server and the Web site. As of the time of writing, both are still unavailable. Minecraft, meanwhile, is back online according to creator Markus Persson (aka "Notch"). The Escapist is currently still down with a 403 error.
Of course, as services are restored it's smart to change your passwords for the affected sites, along with any other sites that you use similar login credentials for. LulzSec is already hinting at another attack in the works, so we'll update as new developments occur.
-
Steve Watts posted a new article, LulzSec targets EVE Online, Minecraft, Escapist.
LulzSec, the hacker group behind a string of recent attacks on game companies, has now targeted EVE Online, Minecraft, and the gaming Web site The Escapist. Minecraft is back online, but the other two remain down.-
-
-
-
-
-
Not really complex, most of their so called hacks are SQL injection attacks. Not much work in finding websites that don't sanitize their inputs. The US Senate, wow they got away with a listing of the paintings in the capital and the apache.config file among other exciting things.
Although, I would appreciate any links showing they are using custom software they have written themselves. Using any and all tools made by someone else to do your hacking is weaksauce.-
Terribly sad that http://www.blackbergsecurity.us/ was defaced by an sql injection, right?
-
-
-
-
-
-
-
Here, so you can see it: http://chattypics.com/files/onelolforyou_yn414kxnmy.jpg
Your lol. You earned it. -
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
nobody was saying lolsec was a secret government program. But could the same people funding the lobbyists who back the protect-ip act (and similar bills) also be throwing money at hackers to get them to go after specific servers, and thus get people fired up in support of something they'd otherwise hate? Anyone who thinks that's impossible is a fucking moron. That flavor of business bullshit has been going on for decades.
-
-
-
-
When they finally do get caught, and their names come out, well, it won't be the first time someone gets injured for hacker-type shenanigans. Remember the Russian Spam King? He died from a disagreement with an unwilling recipient of his (virus installing) spam. The settlement of the argument, if I remember correctly, involved someone coming to his house and hitting him in the head with a hammer, over and over and over and over and over... oh, I think it was something around 90 times, according to the coroner. How could they possibly figure that out? Those crazy Russians!
Anyway, it's all fun and games until you get caught and your name gets out there. Then it suddenly gets a little scary. I don't know why you'd want to run around throwing eggs at millions of young people you don't even know. You only need to piss the wrong one off once. -
-
-
-
-
-
-
-
Not so much about security, but more about redundancy and resiliency of your system.
A DDOS attack does nothing but stress the bandwidth, and more importantly, the processing power of your servers. A single zombie system on the internet can generate about 20-50,000 packets per second depending on the packet size and the pipe its connected to. A single server can probably process 50-100,000 packets per second before it starts to chug completely and thats being gracious If you have a distributed server or some type of load balancing, you could probably handle a lot of traffic but not that much more.
The lulzsec guys probably have hundreds, if not thousands of zombie servers throughout the world that they exploited via unpatched systems so you can do the math on how effective their DDOS attacks are.
1 zombie = 50,000 packets per second second
100 zombies = 5,000,000 packets per second
1000 zombies = 50,000,000 packets per second
When you get up to 1000 zombies, there's really not much that's going to save your servers UNLESS there is a single identifying characteristic within ALL of the attack traffic that your upstream ISP can tag on and block it before it gets to you. There are systems to do that but more Tier 1 ISPs don't bother with that stuff since they just deliver the traffic through their big pipes so the burden falls on the content provider.
-
-
-
-
-
never mind, looks like a hotfix.. http://forums.station.sony.com/dcuopc/posts/list.m?topic_id=29467
-
-
-
-
-
-
I can somewhat appreciate the lulz that come from a bunch of MMO addicts raging in withdrawal but srly, now lulzsec are just being straight up assholes. I mean, I get it, companies aren't getting their data sufficiently secured and you're loling at how easy it is to joyride the internets pwning high profile websites. It was entertaining for it bit, now it's just kind of lame. I mean, bringing down Eve Online really isn't all that impressive. If you'd brought down WoW I think you'd have everyone's attention, what lulzsec's doing now is just plan lame.
-