LulzSec’s Sabu targeted Saudi, Kuwait govts while working for FBI: report

Stolen data, including logon credentials of government agents, uploaded to FBI server

Tags: AnonymousCyber crimeIraqKuwaitLebanonSaudi ArabiaYemen
  • E-Mail
LulzSec’s Sabu targeted Saudi, Kuwait govts while working for FBI: report Hector Xavier Monsegur walked free in May this year after being sentenced to time already served. (Getty Images)
By  Stephen McBride Published  October 2, 2014

LulzSec turncoat Hector Xavier Monsegur, known as Sabu among fellow hacktivists, waged a proxy cyber war against 30 governments worldwide, including eight Middle East nations, while working as an informant for the US Federal Bureau of Investigation, the Daily dot reported.

The names of the countries had previously been kept secret. According to the Dot, redacted court documents were deciphered by cross-checking them with leaked IRC (Internet Relay Chat) logs, to compile the list.

Monsegur, 30, directed hacktivist Jeremy Hammond and other Anonymous affiliates to attack the countries, which the Dot says include Saudi Arabia, Kuwait, Yemen, Iraq, Lebanon, Libya, Turkey, Sudan, India, UK, Australia, South Africa and the Philippines. Hammond was arrested in March 2012 and sentenced to 10 years in prison in December 2013, largely based on evidence given by Monsegur.

Attacks included defacement of websites, DDoS disabling and data theft. According to the Dot, all activity was monitored by the FBI, and stolen data, which included the login credentials of non-US government agents, was uploaded to an FBI server.

A memorandum filed by Hammond's legal team, just weeks before his sentence was handed down, called for an inquiry into the FBI operation.

"Why was our government, which presumably controlled Mr Monsegur during this period, using Jeremy Hammond to collect information regarding the vulnerabilities of foreign government websites and in some cases, disabling them?" attorneys, Susan G. Kellman and Sarah Kunstler, wrote in December 2013.

"This question is especially relevant today, amidst near daily public revelations about government's efforts, worldwide, to monitor the communications of, and gather intelligence on, world leaders."

Monsegur was detained by US federal agents in June 2011 for involvement in multiple online cyber campaigns, which resulted in 12 criminal charges carrying a potential sentence of up to 124 years, according to some reports. An unemployed family man, Segur agreed to turn informant for the FBI in return for court leniency. His evidence helped convict a number of other hackers, including fellow LulzSec members. Sabu has spent seven months in prison, and in May this year, according to a report from the Guardian, walked free after being sentenced to time already served.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code