Home / / LulzSec’s Sabu targeted Saudi, Kuwait govts while working for FBI: report

LulzSec’s Sabu targeted Saudi, Kuwait govts while working for FBI: report

Stolen data, including logon credentials of government agents, uploaded to FBI server

LulzSec’s Sabu targeted Saudi, Kuwait govts while working for FBI: report
Hector Xavier Monsegur walked free in May this year after being sentenced to time already served.

LulzSec turncoat Hector Xavier Monsegur, known as Sabu among fellow hacktivists, waged a proxy cyber war against 30 governments worldwide, including eight Middle East nations, while working as an informant for the US Federal Bureau of Investigation, the Daily dot reported.

The names of the countries had previously been kept secret. According to the Dot, redacted court documents were deciphered by cross-checking them with leaked IRC (Internet Relay Chat) logs, to compile the list.

Monsegur, 30, directed hacktivist Jeremy Hammond and other Anonymous affiliates to attack the countries, which the Dot says include Saudi Arabia, Kuwait, Yemen, Iraq, Lebanon, Libya, Turkey, Sudan, India, UK, Australia, South Africa and the Philippines. Hammond was arrested in March 2012 and sentenced to 10 years in prison in December 2013, largely based on evidence given by Monsegur.

Attacks included defacement of websites, DDoS disabling and data theft. According to the Dot, all activity was monitored by the FBI, and stolen data, which included the login credentials of non-US government agents, was uploaded to an FBI server.

A memorandum filed by Hammond's legal team, just weeks before his sentence was handed down, called for an inquiry into the FBI operation.

"Why was our government, which presumably controlled Mr Monsegur during this period, using Jeremy Hammond to collect information regarding the vulnerabilities of foreign government websites and in some cases, disabling them?" attorneys, Susan G. Kellman and Sarah Kunstler, wrote in December 2013.

"This question is especially relevant today, amidst near daily public revelations about government's efforts, worldwide, to monitor the communications of, and gather intelligence on, world leaders."

Monsegur was detained by US federal agents in June 2011 for involvement in multiple online cyber campaigns, which resulted in 12 criminal charges carrying a potential sentence of up to 124 years, according to some reports. An unemployed family man, Segur agreed to turn informant for the FBI in return for court leniency. His evidence helped convict a number of other hackers, including fellow LulzSec members. Sabu has spent seven months in prison, and in May this year, according to a report from the Guardian, walked free after being sentenced to time already served.

Follow us to get the most comprehensive IT Security news delivered fresh from our social media accounts on Facebook, Twitter, Youtube, and listen to our Weekly Podcast. Click here to sign up for our weekly newsletter on curated technology news in the Middle East and Worldwide.

REGISTER NOW | Webinar Event | Security you can bank on – Safeguarding the Middle East’s financial sector

Presented in partnership with security and network specialist Cybereason, the second in the three part webinar series will bring together a panel of experts to discuss how banks and financial institutions are evolving their service offering while simultaneously staying one step ahead of the cyber criminals who seek to bring their operations crashing to the ground.