Leaked IRC Logs Provides Insight into LulzSec

Paul Lilly

On the surface, the hacking group known as LulzSec appears to be a cocky bunch that's seemingly well organized and capable of backing up their bravado, who are unafraid to take on the U.S. government and any other entity they deem worthy of their time and effort. But are they as confident, organized, and capable as they appear to be, or do they fit the mold of the stereotypical teenager hacker, like the 19-year-old who was arrested in the U.K. earlier this week and believed to have played a major role in LulzSec's operations?

Leaked IRC logs published today by the U.K.'s Guardian provide some insight into LulzSec and give a glimpse at how the hacking organization works. According to the logs, a 30-year-old security consultant known a "Sabu" controls the group of around six to eight people and keeps everyone in line. "Kayla" supplies the botnet, and "Topiary" is the one responsible for promoting LulzSec's image via press releases and Twitter.

"They turn to be obsessed with their coverage in the media, especially in physical newspapers, sharing pictures of coverage they have received in the Wall Street Journal and other papers," the Guardian writes. "They also engineered a misinformation campaign to make people think they are a U.S.-sponsored government team."

The seemingly tight-knit group doesn't always see eye-to-eye. Two members quit after LulzSec attacked an FBI site on June 3, prompting Sabu to tell the remaining members that, "You realize we smacked the FBI today. This means everyone in here must remain extremely secure."

According to the Guardian, the logs were leaked by a former affiliate named "m_nerva," a move that didn't sit well with LulzSec.

"Remember this tweet, m_nerva, for I know you'll read it: your cold jail cell will be haunted with our endless laughter. Game over, child," LulzSec said.

The Guardian provides a ton of analysis on LulzSec, which you can read here .

Around the web