LulzSec redux dumps data after raiding military dating site

Share this article:

Hackers calling themselves "LulzSec Reborn" have claimed responsibility for two breaches that resulted in the dumping of personal information.

The attackers on Sunday exposed the email account information, including names, usernames, passwords and IP addresses, belonging to some 170,000 members of MilitarySingles.com, an online dating website, according to a Pastebin document. The site remains operational, but apparently to show proof of their hack, the intruders defaced at least one page on the site, which is still reachable.

A spokesperson at the company that owns MilitarySingles, Tennessee-based ESingles Inc., did not respond to a request for comment. But someone claiming to be an administrator posted a comment on the DataBreaches.net website, which chronicles information loss incidents, and said it's possible the breach claim was "false" but that it would investigate.

More spilled information, including private messages shared among members of the site, could be on the way, according to a tweet Tuesday from "Operation Digiturk," which appears to be affiliated with Anonymous in Turkey.

Meanwhile, LulzSec Reborn on Monday also has announced, via another Pastebin post, that it hijacked the database belonging to San Jose, Calif.-based CSS Corp, a technology solutions provider. The hackers claimed to have ripped off the names, phone numbers, usernames and passwords of users.

It appears unlikely that the person or group responsible for these two hacks was part of the original LulzSec, which closed up shop last June and whose members have been arrested since then.

Share this article:

Sign up to our newsletters

More in News

Two plead guilty for roles in separate Android app piracy groups

Two members of different Android app piracy groups pleaded guilty this week to conspiracy to commit criminal copyright infringement.

Study: Eighteen percent of online adults have had personal info stolen

About 18 percent of online adults have had personal information stolen, and more than 20 percent had an email or social networking account compromised.

Pentagon to triple its security workforce by 2016

Pentagon to triple its security workforce by 2016

Defense Secretary Chuck Hagel recently announced the recruitment efforts during a speech in Fort Meade, Md.