Reborn LulzSec claims hack of dating site for military personnel

An announcement posted by hackers on Pastebin links to what it says are details of 163,792 users

A group of hackers claiming to be the reborn Lulz Security (LulzSec) took credit for an alleged compromise of, a dating website for military personnel, and the leak of over 160,000 account details from its database.

The group announced the hack on Twitter and Pastebin on Sunday, using the name "LulzSec Reborn" and ASCII art previously associated with LulzSec, the hacker group that apparently disbanded and merged with the Anonymous hacktivist collective last year.

The Pastebin post included links to RAR archives hosted on public file sharing websites that allegedly contain the names, usernames, e-mail addresses, IP addresses, and passwords of 163,792 users. "There are emails such as ; ; ; ; etc.," the group wrote.

Someone claiming to be the administrator of posted a comment on after the site reported on the breach, saying that there is no evidence of a compromise.

The comment also suggested that ESingles, the company which runs the dating website, is nevertheless investigating the claims and taking the necessary security precautions.

The message annoyed members of "LulzSec Reborn" who, in response, called the administrator "stupid" and uploaded a "hacked by" page to the website in order to prove that they have access to it.

ESingles didn't immediately return a request for comment.

The directory in which the rogue page was uploaded is unprotected and appears to contain internal files associated with the site's content management software. If the credentials used for the database connection are available in one of those files, it would make stealing the user information fairly easy.

The original LulzSec hacker group took credit for many high-profile attacks during the spring of 2011. The FBI and other law enforcement agencies worldwide have since arrested several individuals believed to have been associated with the group. At the beginning of March it was revealed in official court records that LulzSec's alleged leader, a hacker known online as Sabu, has been working as a cooperating witness with the FBI since August 2011.

The rebirth of LulzSec seems to be the hacktivist community's response to Sabu's perceived betrayal of their cause and the arrests that resulted from his cooperation with the authorities. The LulzSec Reborn Twitter account was created on March 9 and was accompanied by videos posted on YouTube announcing the group's return on the hacking scene.

This isn't the only hack that Lulsec Reborn has claimed: On Monday, the group said it had compromised, the website of a San Jose-based information and communication technology company called CSS Corp.

Join the CSO newsletter!

Error: Please check your email address.

More about FBILeaderLeader

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts