Lulz Security Raids Bethesda Softworks Servers And US Senate

Lulz Security Raids Bethesda Softworks Servers And US Senate

The scurvy dogs aboard the SS Lulz have raided Bethesda Softwork’s servers after unsuccessfully trying to extort game info out of them. Ah well. They’ve also released a bunch of internal data from the US Senate’s website for further giggling.

The Bethesda attack centered around FPS title Brink, from which LulzSec plundered over 200,000 user accounts. From there, they went straight at Bethesda:

After mapping their internal network and thoroughly pillaging all of

their servers, we grabbed all their source code and database passwords, which we proceeded to shift silently back to our storage deck.

The server data’s out in the open, but Lulz is keeping the Brink user info private for now.

All of this because they wanted more information about Skyrim. I mean, I guess it looks pretty good, but, uh.

And then there’s the Senate leak. The “small hack” of – which appears to be a dump of the site’s root directory – is basically just a mammoth list of file names, including such crazy gems as “The_Senate_Chamber_Desks.htm” and “yellow_warbler.jpg”. Nothing that will compromise national security, but an embarrassment to the government’s ability to safeguard itself, for sure. And no mention of how they got in to begin with.

But why the US Senate? They don’t have any information on Skyrim, do they? LulzSec explains:

We don’t like the US government very much. Their boats are weak, their lulz are low, and their sites aren’t very secure. In an attempt to help them fix their issues, we’ve decided to donate additional lulz in the form of owning them some more!

Oh, well alright. It’s going to be a late night for a couple of IT teams in the DC area. [LulzSec]


  • And there you go… I can already see us crying over the loss of net neutrality in a few months, the US calling any hacker a terrorist, and all of that because of this…

  • When they catch these guys, they should lock them up in maximum security (see what I did there) with all the rapists and murderers.
    Then we’ll see some lulz!

  • Love the immature 13yo responses in the comments. Someone copied data that wasn’t yours… data that isn’t real and wasn’t yours to begin with… get over it.

  • Comments here seem pretty harsh. This group is certainly taking part in criminal activity, and if they were trying to extort information about Skyrim I would see them as being pretty immature. But I do have some respect for them for not making their attacks malicious. As they state they do it for the laughs and the amusement of the internet, and in doing draw attention to security holes in these organisations.

    If this was their sole intention then they could do it a lot more efficiently, by actually telling organisations of the weaknesses they took advantage of, but clearly this isn’t the sole reason they do it. They are motivated by the fun and no doubt the publicity as well.

    I wouldn’t encourage them, but so long as they are doing little to no harm I don’t think they belong “in maximum security with all the rapists and murderers” or deserve that much hatred.

  • i honestly think this has gone too far, and they need to be stopped. If they hacked in and notified administrators of holes in the system, then i dont have a problem with it, i do however have a problem by the fact they are stealing,relasing and keeping private user information with email addresses and other credentials without our permission, and ultimately we don’t know what they are doing with it.
    While reading their twitter feed, there have already been people out there not affiliated with the group, grabbing login details of people, and vandilising facebook pages, because their info got released.
    And whats their end game? or do they plan on doing this until they get caught?

    It’s all fun and games now, but wait till more criminals take advantage of it.

  • Trying to extort information from a company about a game justifies stealing account information?

    How old are these people? And how bad is the security that they can break in?

  • next week. CIA confirms death of “Lulzsec” leader after Raid.

    Seriously, these are childish (unemployed) idiots who have nothing better to do, and are now pissing off the US government. Who just last week were talking abut Acts of War, and to quote one US General “You attack our networks, we might just put a tomahawk down your Chimney”

    Who do these people think they are? Robin Hood?

  • I love how these idiots are still operating under the guise of improving network security.

    These people are stealing data and disrupting services for everyone, consumers and corporations alike. It’s not helping anyone. Just a bunch of bored kids trying to be ‘1337’ and get their names on the innarwebz.

    These people are the problem right now, and someone needs to do something about it. I just hope they hit a few more US government websites. Then there will be lulz – in uniforms kicking your door in.

  • Yeah its going a bit beyond a joke now.

    I’m curious, do they make any profit or anything out of the details that they’ve stolen?

  • If the criminal courts don’t get them, the civil courts will. Maybe both.

    It’s only a matter of time till they slip up and get caught.
    Or dobbed in.

  • I think if companies have a duty of care to their consumers, and that duty of care includes being able to secure their own infomation. If a company cant secure it’s infomatin then people have the right to take it, and show that company how bad their security is. LuzSec is just a wake up call for big companies who think they are untouchable because they have lots of money, they arn’t and LuzSec are just proving that to everyone.

Show more comments

Log in to comment on this story!