LulzSec takes down CIA website

Hacker group claims responsibility for DDoS attack against US Intelligence Agency’s public site

Tags: Cyber crimeHackingHacktivismUSA
  • E-Mail
LulzSec takes down CIA website Hacker group LulzSec has claimed responsibility for an alleged DDoS attack against the CIA.
By  Georgina Enzer Published  June 16, 2011

Hacker group Lulz Security (LulzSec) has claimed that it has taken down the US Central Intelligence Agency’s public website, according to the BBC.

The site was unavailable at times on Wednesday, but seemed to be back up on Thursday. It was unclear if the inaccessibility of the website was due to the hack or a large number of internet users trying to verify whether the site was down.

The alleged hack into the CIA took place on the same day that LulzSec opened a phone line for fans to suggest potential hacking targets. The hacking group posted the phone number on their Twitter feed and it appears to have an area code from the state of Ohio. Callers are greeted by a voice recording in a heavy French accent.

LulzSec is fighting Anonymous for the limelight after it claimed attacks on the US Senate’s public website, Sony, Nintendo and several US broadcasters.

LulzSec recently released a statement saying that they do not like the US government and claiming to have secured data from the Senate.gov website.

“We don't like the US government very much. Their boats are weak, their lulz are low, and their sites aren't very secure. In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more! This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?” the statement read.

LulzSec announced the CIA attack via Twitter.

“Tango down - cia.gov - for the lulz”, the group wrote on their Twitter feed.

The hacker group has so far claimed that it has conducted eight DDoS attack against sites suggested by callers.

A DDoS attack is when a website is crashed by inundating it with requests from computers under the attacker’s control.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code