Hacker Group LulzSec Invents New Ways to Harass Companies

The hacker group, Lulz Security (LulzSec), has followed up the series of Distributed Denial of Service (DDoS) attacks it committed on multiple websites yesterday.
Hacker Group LulzSec Invents New Ways to Harass Companies
The home page of the Hacker group Lulzsec. (lulzsecurity.com)
6/15/2011
Updated:
10/1/2015

<a><img src="https://www.theepochtimes.com/assets/uploads/2015/09/lulz12345r.jpg" alt="The home page of the Hacker group Lulzsec.  (lulzsecurity.com)" title="The home page of the Hacker group Lulzsec.  (lulzsecurity.com)" width="320" class="size-medium wp-image-1802441"/></a>
The home page of the Hacker group Lulzsec.  (lulzsecurity.com)
The hacker group, Lulz Security (LulzSec), has followed up the series of Distributed Denial of Service (DDoS) attacks it committed on multiple websites on Tuesday, self-dubbed “TitanicTakeoverTuesday,” with a new and inventive type of DDoS tactic utilizing phone number rerouting.

DDoS attacks work by utilizing a large number of random internet-linked computers infected with a hacker’s specific malware, called bots, to send masses of repeated load requests at websites or servers in order to overwhelm their capacity to operate.

LulzSec’s newest source of entertainment comes from its recently introduced phone line, which immediately received and continues to receive huge volumes of phone calls from followers and fans. LulzSec phone traffic boomed as part of a competition it issued for callers to guess the random “magic word” in order to win $1000.

LulzSec quotes in a tweet from its Twitter account @LulzSec, “If 614LULZSEC is overcapacity, try our second routing number at (732) 993-7703 as we get insane call traffic on our primary switchboard.”

On June 15, LulzSec issued another Tweet saying “Everyone call 614-LULZSEC for a fun surprise,” resulting in thousands of calls immediately flooding in. LulzSec than rerouted their number to the customer support line of magnets.com because “they wouldn’t tell us how magnets worked.”

LulzSec stated that according to a magnets.com representative, the website’s support line suddenly received over 200 new calls per minute, overwhelming the line’s operators and achieving the DDoS effect in a much more physical sense. LulzSec than rerouted their number to “FBI in Detroit,” saying that they “just got hundreds of calls.”

LulzSec is continuing to route calls to various customer support lines. “A certain hosting company just got 1000+ calls,” says another tweet.

Yesterday, LulzSec attacked the websites of Escapist Magazine, a video gaming publication, Fin Fisher, a government information technology website, and the websites of the computer games EVE Online, Minecraft, and League of Legends.

Each of the game website attacks also affected the actual games themselves, shutting them down for several hours.

LulzSec states that all of their attacks come in the sake of “lulz” and good laughs. They have attacked numerous companies and websites including Sony, Nintendo, and PBS, and have leaked information ranging from porn user account databases to network information from the US Senate’s official website.