88888888888 888 888 8888888888 d8888 88888888888 8888888888 d8888 888b d888
888 888 888 888 d88888 888 888 d88888 8888b d8888
888 888 888 888 d88P888 888 888 d88P888 88888b.d88888
888 8888888888 8888888 d88P 888 888 8888888 d88P 888 888Y88888P888
888 888 888 888 d88P 888 888 888 d88P 888 888 Y888P 888
888 888 888 888 d88P 888 888888 888 888 d88P 888 888 Y8P 888
888 888 888 888 d8888888888 888 888 d8888888888 888 " 888
888 888 888 8888888888 d88P 888 888 8888888888 d88P 888 888 888
ud$$$**$$$$$$$bc.
u@**" 4$$$$$$$Nu
J ""#$$$$$$r
@ $$$$b
.F ^*3$$$
:% 4 J$$$N
$ :F :$$$$$
4F 9 J$$$$$$$
4$ k 4$$$$bed$$$$$$$$$
$$r 'F $$$$$$$$$$$$$$$$$r
$$$ b. $$$$$$$$$$$$$$$$$N
$$$$$k 3$$$$$$b $$$$$$$."$$$$$$$$$
.@$**N. $$$$$" $$$$$$F'L $$$$$$$$$$$ $$$$$$$
:$$L 'L $$$$$ 4$$$$$$ * $$$$$$$$$$F $$$$$$F edNc
@$$$$N ^k $$$$$ 3$$$$*% $F4$$$$$$$ $$$$$" d" z$N
$$$$$$ ^k '$$$" #$$$F .$ $$$$$c.u@$$$ J" @$$$$r
$$$$$$$b *u ^$L $$ $$$$$$$$$$$$u@ $$ d$$$$$$
^$$$$$$. "NL "N. z@* $$$ $$$$$$$$$$$$$P $P d$$$$$$$
^"*$$$$b '*L 9$E 4$$$ d$$$$$$$$$$$" d* J$$$$$r
^$$$$u '$. $$$L "#" d$$$$$$".@$$ .@$" z$$$$*"
^$$$$. ^$N.3$$$ 4u$$$$$$$ 4$$$ u$*" z$$$"
'*$$$$$$$$ *$b J$$$$$$$b u$$P $" d$$P
#$$$$$$ 4$ 3*$"$*$ $"$'c@@$$$$ .u@$$$P
"$$$$ ""F~$ $uNr$$$^&J$$$$F $$$$#
"$$ "$$$bd$.$W$$$$$$$$F $$"
?k ?$$$$$$$$$$$F'*
9$$bL z$$$$$$$$$$$F
$$$$ $$$$$$$$$$$$$
'#$$c '$$$$$$$$$"
.@"#$$$$$$$$$$$$b
z* $$$$$$$$$$$$N.
e" z$$" #$$$k '*$$.
.u* u@$P" '#$$c "$$c
u@$*""" d$$" "$$$u ^*$$b.
:$F J$P" ^$$$c '"$$$$$$bL
d$$ .. @$# #$$b '#$
9$$$$$$b 4$$ ^$$k '$
"$$6""$b u$$ '$ d$$$$$P
'$F $$$$$" ^b ^$$$$b$
'$W$$$$" 'b@$$$$"
^$$$*
_ _ _____ _ _____ _
| | | | __ | _ | (_) | _ | | |
| |_ _| |_______ ___ ___ / / __ _ _ __ | |/' | ___ _ ___ | |/' |_ ___ __ ___ __| |
| | | | | |_ / __|/ _ \/ __| / / / _` | '_ \| /| |/ __| / __| | /| \ \ /\ / / '_ \ / _ \/ _` |
| | |_| | |/ /\__ \ __/ (__ / / |(_| | | | \ |_/ /\__ \ \__ \ \ |_/ /\ V V /| | | | __/ (_| |
|_|\__,_|_/___|___/\___|\___| / / \__, |_| |_|\___/ |___/_|___/ \___/ \_/\_/ |_| |_|\___|\__,_|
/_/ __/ |
|___/
##################################################################################################################################
##################################################################################################################################
To understand who/what lulzsec/gn0sis are/is you need to understand where they came from. Everything
originates from the *chan (4chan/711chan/etc.) culture. This internet subculture is pretty much the
dregs of the internet. It's a culture built around the anonymity of the internet. If your anonymous
no one can find you. No one can hurt you, so your invincable. The problem with this idealogy, is it's
on the internet. The internet by definition is not anonymous. Computers have to have attribution.
If you trace something back far enough you can find its origins. So let's give a brief event timeline
on how these groups got together:
1. Anonymous rises up from 4chan against CoS.
2. Anonymous starts DDoSing stuff.
3. Various lower level hacking groups get involved.
4. Anonymous stagnates for a while.
5. Uprisings in the world Attract Anonymous.
6. ProjectPM Looser Barrett Brown becomes mouth piece of Anon.
7. Anonymous shifts focus toward "Worldy" Affairs.
8. Aaron Barr desides he's tired of his job and targets Anon.
9. gn0sis (Uncommon) comes out of no where and releases the Gawker data.
10. gn0sis teams up with anon hackers with all the OP
crap.
11. gn0sis (nigg, eekdacat, uncommon, kayla, lauralie) and sabu (from OP Anon shit) hack HBGary.
12. This is where Topiary comes in. They all form lulzsec to be "hacktivists".
13. Lulzsec (now a mix of gn0sis and opanon people) hack SONY and other stuff.
The problem with Lulzsec/gn0sis's "Hacktivist" mantra is that they lack the skills to keep it going.
As such after SONY they couldn't get into anything. So they switched their focus to just releasing
random crap that didn't mean anything. Then they started running out of things they could hack. So
they put out requests for people to join them. That got them a few hits, and now they've switched
their gears again to be "ANTI-SEC". Whether or not this was an attempt at bring other groups out of
the shadows (el8, h0no, zf0, etc), you can only speculate. But as of this writing: 6/24/2011 Sabu
and Topiary are the only two people updating the twitter and releasing shit. Kayla is MIA. The
gn0sis kids are gone in hiding somewhere.
From what we've seen these lulzsec/gn0sis kids aren't really that good at hacking. They troll the internet
and search for sqlinjection vulnerabilities as well as Remote File Include/Local File Include bugs. Once
found they try to download databases or pull down usernames and passwords. Their releases have nothing
to do with their goals or their lulz. It's purely based on whatever they find with their "google hacking"
queries and then release it.
What's funny to us is that these kids are all "Anti-Sec" yet by releasing their hacks they are forcing these
companies to have to hire security professionals which keeps the Security Industry that they are trying to
expose and shut down, in business. I guess they will realise that later in life when they get out of skid
school.
So we've been tracking and infiltrating these kids since the gawker hack. We have the D0x (as they call it)
on everyone except Sabu and Kayla. First we'll go with the kid who did the gawker hack: Uncommon.
The whole thing is at Oh my http://pastebin.com/iVujX4TR