PORTLAND, Ore. — Hacker group Lulz Security said that it hit 56 porn sites on Friday, stealing and posting administrative emails and outing 26,000 emails and passwords from users of tube site Pron.com.
Two weeks ago the group took credit for hacking PBS.org and Sony, exposing employee information and leaking the source code for the Sony Computer Entertainment Developer Network reportedly in retaliation for a negative documentary program on WikiLeaks.
Lulz Security is reportedly connected to the hacker collective Anonymous.
The exposed Pron.com data specifically targeted military and government emails but doesn’t include data that can be used to access their accounts.
“Hi! We like porn (sometimes), so these are email/password combinations from Pron.com which we plundered for the lulz,” the group posted on its website, LulzSecurity.com.
The group has also attacked Nintendo, FBI affiliate Infragard Atlanta and data security company Unveillance, among others.
But Lulz Security is also credited with some “white hat” work according to DigitalTrends, reportedly having alerted the British National Health Service to its network’s password vulnerabilities, and it took down Muslim terrorist website Aljahad.com, showing off its cyber hacking strength to rival hacker “Th3J35t3r.”
In its attack on PBS on May 30, the group posted a fake story about deceased rapper Tupac Shakur living in New Zealand that saw its Twitter account blow up to more than 120,000 followers.
Security expert Patrick Gray wrote on Risky.biz, “LulzSec is running around pummeling some of the world’s most powerful organizations into the ground … for laughs! For lulz! For shits and giggles. Surely that tells you what you need to know about computer security: there isn’t any.”