Don't have an account? Sign up now
When egos or motives clash, hackers attack each other
For the past year, hacktivists have been playing nicely among themselves, content to focus their efforts on government agencies and corporations. Now, a bold group called the UGNazi is provoking the infamous Jester (th3j35t3r), and it may spark a hacker-on-hacker battle reminiscent of last summer.
December 28, 2010: The Jester attacks 4chan
The Jester claims responsibility for a distributed denial-of-service attack against 4chan.org, where Anonymous members are known to organize their efforts. Anonymous had unsuccessfully tried to unmask The Jester, who initially attracted attention from Anonymous after launching a DDoS at WikiLeaks in November 2010.
May 31, 2011: LulzSec Exposed, Kind of
Discussions held between several high-profile members of Anonymous and LulzSec are leaked by a hacker known as m_nerva. LulzSec later released a statement claiming the discussion was not held on “the LulzSec core chatting channel.” The group later served up m_nerva’s personal information in retribution.
June 15, 2011: Operation ‘Unmask’ Backfires, Spawns LulzSec’s 50-Day Assault
Operation “Unmask,” launched to reveal The Jester’s identity, backfired on Anonymous member Nakomis, later identified as Casey Gardiner, pictured in a vest with a nametag that reads “JESTER.” The failed mission would serve as the launching point for LulzSec, a Pastebin post claims.
June 22, 2011: Disgruntled Researcher Pulls Back Curtain
Leader ‘Sabu’ In a June 22, 2011 Pastebin post, a hacker known as Killer Cube identified LulzSec leader Sabu as New York resident Hector Monsegur. Six months later, The Jester would concur. On March 6, 2012, FBI documents confirmed Monsegur was Sabu, leader of LulzSec and key FBI informant in the case against the group.
June 23, 2011: TeaMp0isoN Declares War on LulzSec
In an interview with Fox News, a reportedly 23-year-old member of hacking group Team Poison known as Hex0010 declared that LulzSec is “nothing but a bunch of script kiddies.” He also identified Swedish web designer Sven Slootweg and 19-year-old British hacker Ryan Cleary as members of LulzSec.
June 24, 2011: Rogue Hacker Dubbed ‘Oneiroi’ Takes Down LulzSec Website
A day after LulzSec released sensitive information on Arizona police officers, a rogue hacker calling himself Oneiroi took credit for a DDoS attack that took down the LulzSec website. Calling it “Operation Supernova,” Oneiroi said he wanted to be “bloody clear” that LulzSec was the desired target.
June 25, 2011: LulzSec Calls it Quits After Information on More Members Comes Forward
On the same day that a rival hacking group calling themselves “The A-Team” published an abundance of information on alleged LulzSec members, LulzSec issued its farewell statement after “50 days of Lulz.” One day later, however, LulzSec would respond to The A-Team with a leak of its own.
May 31, 2012: UGNazi Hacks MyBB to Teach Security Lesson
The Underground Nazi Hacktivist Group, or UGNazi, hijacked the website for MyBB, which provides bulletin board software for the site “hackforums.net.” In a statement, the group declared that they “are tired of all the skids who claim they are hackers
June 1, 2012: UGNazi Provokes The Jester with Attack on Wounded Warrior
Project Cosmo, a hacker with UGNazi, told Softpedia that the group attacked the Wounded Warrior Project’s website simply because he has “a personal thing with jester.” Attacking a nonprofit website that helps bring assistance to wounded U.S. veterans brought a swift response from The Jester, whose support for U.S. troops motivated his 2010 attack on WikiLeaks.