Only hours after embarrassing the CIA by downing its website, hacking jokesters LulzSec have issued another self-declared indictment of the Internet’s woeful security, leaking a database of 62,000 stolen passwords and user names. Only hours after embarrassing the CIA by downing its website, hacking jokesters LulzSec have issued another self-declared indictment of the Internet’s woeful security, leaking a database of 62,000 stolen passwords and user names.Which sites the logins were culled from and when and how the hack happened the group was not revealed, but the majority are webmail logins for common sites such as Gmail, Yahoo and Hotmail. The group encouraged anyone downloading the list to try out its contents on various sites.“These are random assortments from a collection, so don’t ask which site they’re from or how old they are, because we have no idea,” read text at the top of the file, adopting the group’s typically laconic form of address. “We also can’t confirm what percentage still work, but be creative or something.” Followers of LulzSec on Twitter have quite openly claimed to have broken into a clutch of different sites using the leaked data, acts which could open these individuals to criminal prosecution.Are the 62,000 logins from a single database or several stitched together? At least one security expert, F-Secure’s Mikko Hypponen said he believed they could be from US literary site, Writerspace.com. “Why writerspace.com? Well, the most common passwords include these: mystery, bookworm, reader, romance, library, booklover and..writerspace,” tweeted Hypponen.With the Anonymous Group in retreat, LulzSec have taken over their mantle in recent weeks with a series of high-profile hacks, including against Sony, PBS, several gaming networks and even the CIA website to their name. Beyond embarrassing all and sundry, the group’s agenda remains obscure, which perhaps is their agenda. Related content news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership brandpost Unmasking ransomware threat clusters: Why it matters to defenders Similar patterns of behavior among ransomware treat groups can help security teams better understand and prepare for attacks By Joan Goodchild Sep 21, 2023 3 mins Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe