I’ve taken the time to scour through Twitter and the web to put together this quick rough timeline detailing the ever-growing list of the hacks and DDoS attacks by the LulzSec team. If I’m missing anything, please feel free to comment or drop me a line.
X Factor contestants database released
Fox.com sales database, usernames/password and inner workings released. LinkedIN pictures changed.
UK ATM database released
Sonymusic.co.jp database released
PBS.org defaced, fake Tupac article placed. Also internal nodes, database list, staffers database, authors database, pressroom users database, stations database and MySQL users database all released.
2660 IRC channel irc.2600.net DoS’d
Sonypictures.com AutoTraders users database released
Sonypictures.com Summer of Restless Beauty users database released
Sonypictures.com Sony Wonder coupons database made available for all to use
Sonypictures.com Sony Wonder music codes database made available for all to use
Sonypictures.com Seinfeld Del Boca Vista database released
Sonypitctures.com database tables released
SonyBMG.nl partners and Admin database/layout released
SonyBMG.be users database released
AKA – The Day Sony Got Pwned (the first few times)
Infragard – Atlanta Chapter (wiped)
Karim (from Unveillance) dox’ed, IRC logs, emails, secret voice conference released
Nintendo.com hacked and only a webserver configuration file was released. Lulz likes Nintendo!
Sownage 2 released, SceDev.net Source Code released to the entire world
Sony BMG Internal network maps also released
Candian Conservative Party website hacked, fictional press release posted.
LulzSec rests (kidding, if I’m missing something, let me know)
NHS hacked, but LulzSec notifies them and doesn’t release user names/passwords
Pron.com users Database (hacked and posted)
AlJahad.com DDoS’ed and brought down for short period of time
Endgames & Prolexic dox’ed by LulzSec
Sony to be hacked again?
@awinee, @Chatterb0xxx @th3j35t3r @aaronbarr all either badgered, called out or owned by LulzSec.
@GregoryDEvans of http://www.ligattsecurity.com/ (site DDoS’ed) at fake threat of releasing their aliases and identities.
@JosephKBlack of Black & Berg Cybersecurity Consulting poses hacker challenge, LulzSec accepts and succeeds, doesn’t want the $10,000 prize. Lulz were enough.