Skip to main content

LulzSec DDoS attacks disrupt CIA and other U.S. agencies’ sites

cia site downHacker group LulzSec continued their antics today with brazen attacks against U.S. agencies. The CIA website was hit this afternoon by a DDoS attack, the Detroit FBI headquarters were hit with a phone DOS and the Senate also claims the group attempted to break into their website for the second time.

“Tango down – CIA.Gov- for the lulz.” the group taunted on the LulzSec Twitter account. Immediately after the tweet and for the rest of the day the agency’s website loaded slowly or not at all. CIA representatives had no real comment on the events, only that they were looking into it.There is no evidence that sensitive data had been compromised. Service to the U.S. Central Intelligence Agency site resumed a more reliable nature once LulzSec showed a little mercy.

Recommended Videos

“Goodnight twitter. The CIA anti-lizards will probably rise from the packet sea while we rest our shining -yet-saturated power field arrays,” the group tweeted, 4 hours after the attacks began.

Before the CIA site takedown, LulzSec was also redirecting their publicly available 614-LULZSEC request line to many targets’ call centers, creating a DOS for the phone service. Along with the FB I in Detroit, the hackers’ “phone redirect hive” hit WOW customer support and HBGary as well as the customer support for magnets.com who reportedly took in 200+ calls a minute.

Over the weekend, the U.S. Senate claimed that LulzSec managed to infiltrate their servers. The hacker group released stolen data, but Senate Deputy Sergeant-at-Arms Martina Bradford released a statement which said the data wasn’t sensitive and was intended for public consumption. On Wednesday the Senate also reported that their website was attacked once again, though it is not clear if this was the work of the LulzSec.

All of this discord comes at the heels of yesterday’s Titanic Takeover Tuesday where several popular MMO’s were hit with DDoS attacks. LulzSec has also hit numerous high-profile sites including SONY, Nintendo, and FBI’s Infragrade, showing off their muscle. Reuters says that security analysts have downplayed these attacks which are only for attention since there hasn’t been any sensitive data lifted.

Jeffrey Carr, author of the book Inside Cyber Warfare: Mapping the Cyber Underworld, points out that, “All they’re doing is saying ‘Look how good we are’. These guys are literally in it for embarrassment, to say ‘your security is crap.’”

Topics
Jeff Hughes
Former Digital Trends Contributor
I'm a SF Bay Area-based writer/ninja that loves anything geek, tech, comic, social media or gaming-related.
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more