Jun 17, 2011
The now famous Lulz Security hacker group strikes again. After DDOsing the CIA’s website using packet flooding, they exposed some 62,000 email with it’s passwords. While the list is not connected after the attack on this high profile US government site. It was believed that it’s members were involved in obtaining those email accounts from different sources. The said email accounts could have been obtained from their previous successful attacks on several private, gaming, pornographic and government sites. The 2MB+ list were uploaded via the mediafire site available for everyone to download.
Gizmodo on the other hand claims that they have some sort of ‘automated script’ that can help you check if your email account was included in the said list.
Everyone should download the file and see if your email accounts was included in the said list. If you’re hesitant to download the file, just change your password on all your email accounts. Because at this moment those email accounts were exposed to everybody for exploitation. The worse thing that can happen is that if you’re using the same email/password combination on every site you visit.
Previously they exposed some 25,000 email/passwords taken from www.pron.com site. You can visit my post here.