Lizard Squad’s cyberattack tool hacked, customer details leaked

The hack is the second piece of bad news in a week for the group, after a man was arrested in connection to the hacks on Friday

Andrew Griffin
Monday 19 January 2015 15:44 GMT
Comments
The Lizard Squad's Twitter avatar
The Lizard Squad's Twitter avatar

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

Lizard Squad, the hacking group that took down Xbox Live and PlayStation Network on Christmas day and then tried to sell its tools to people on the internet, has been hacked itself.

An American journalist claims to have accessed a customer database for LizardStresser, the tool that the group claims can give customers the ability to execute similar hacks to the one that took down Xbox and Sony’s online gaming networks.

Brian Krebs, an American security journalist, has been active in engaging with the group since the Christmas hack and didn’t say where he got the documents from.

The group charged between $6 and $500 in bitcoin to use the tool for varying amounts of time. It is thought that the cyberattacks on the gaming networks — which took some functionality down for almost a week through a distributed denial of service attack — were advertising for the tool.

Krebs has said that the tool runs on hacked home network routers.

It is the second setback for the group in a week, after a teenager was arrested on Friday in connection with the hacks.

All of the login details for users were stored in plain text, Krebs claimed, which means that they can be read easily if the database is found.

The documents show that the tool attracted “more than 14,241 registered users, but only a few hundred appear to have funded accounts at the service”, Krebs claims. But paying customers deposited more than $11,000 in bitcoins with the group, he said.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in