Lulzsec | 62,000 Passwords, Usernames and Emails

seeders: 2
leechers: 0
Added on June 17, 2011 by HilltopHoodsin Books
Torrent verified.



Lulzsec | 62,000 Passwords, Usernames and Emails (Size: 629.89 KB)
 Lulzsec.rar629.89 KB

Description

The Lulz Boat


Compressed as RAR for faster download

To Uncompress use WinRAR on Windows or UnrarX on MAC

Please check to see if your passwords and emails are not on the list. If they are change them immediately

Don't forget to Seed

Lulzsec, the notorious hacking group, last night published a list of 62,000 email addresses and passwords. Among them were several ending in .gov.au.
This morning, it republished the list which is still live at the time of writing.

Lulzsec wouldn't say where the information came from but, while we couldn't confirm the authenticity of the claims, the number of people crowing about what they had done with the information, makes it look very real.

Some responses posted on Twitter have been:

@RDisher Ordered a large pack of condoms for an elderly woman on Amazon.
@Athenas88 Well that was amusing, some poor woman will read on facebook that her husband is leaving her for a blowup doll #happycry
@TheDancingMilk Got an Xbox Live, Paypal, Facebook, Twitter, YouTube THE WHOLE LOT! J-J-J-J-J-J-JACKPOT
@Murraaayyy Cheers for the paypal account with £250 in it! ;)
@Weilegeber Ruined 2 relationships via Facebook so far today. Thanks, Lulzsec!
@Lulzsec Last time we did this, one of you hijacked the account of some dude who was secretly cheating on his partner. That's pure gold, nicely done.
@LulzSec You know what else he used "[password deleted]" for? His twitter, his online payment accounts, his personal email, and his Linkedin. Secure or SECURE?
@kawesomek What the f***. Got an e-mail that's got plenty of conversations with 14-15 year old girls naked..
@tr4nscend got 3 e-mails with active dating site profiles. changed all pictures to dicks.
@LulzSec There is some very angry level 85 WoW player cutting his wrists right now, thanks to @MiracleJoe and LulzSec. Let it flow...



Prior to this Lulzsec allegedly took the CIA's public facing web page offline with a DDoS attack (where someone uses an 'army' of compromised computers to overwhelm a webpage) and took several online games offline.

The group also attacked the notorious 4chan website, taking that down for a short time.

In doing this it alienated many natural supporters who have traditionally supported similar anarchic actions. It also annoyed the other notorious hacking group, Anonymous, which tweeted:

With the DoS of the #CIA today, you'd think these kids hacked the gibson or something. Lulz = anon without a thinking head.

At the time of writing we'd warned some of those on the list with Australian email addresses but hadn't heard back from them. One address gave a reply saying that it didn't exist - the person either not having existed or, more likely, having already left the organization.

Despite the natural furore surrounding the group's actions, many have still praised Lulzsec for its actions. While some have done so because they themselves have profited from the group's actions, others have noted how the group has highlighted the need for improved security from companies that store public details.

It has also highlighted the necessity for users not to use the same password in many places.

Although the original file was removed, Lulzsec has since reposted it online and recently claimed it got downloaded 200 times in 20 seconds. The group's Twitter following has ballooned by tens of thousands over the past several hours and currently stands just under 200,000.

Concerned individuals, should check to see if their details have been listed and ensure that none of their online accounts have been compromised.

Article Source

Sharing Widget


Download torrent
629.89 KB
seeders:2
leechers:0
Lulzsec | 62,000 Passwords, Usernames and Emails

All Comments

Thanks! :)
bad not working
Thanks mate
Thank you... merci. ;)
565
then u are stupid my friend
legit :D
good for making a wordlist
THANKS
Its not worth untill we know which service these accounts are associated with..