LulzSec accessed public data: US Senate

Powered by SC Magazine
 

Security review to follow website hack.

The LulzSec hacking group accessed only public data during an attack on the US Senate website over the weekend and did not breach a firewall protecting sensitive information, according to the US Government.

Martina Bradford, the deputy Senate sergeant at arms who provides security for the Senate, said that despite the breach, senator's information was not compromised.

“We were responding to their allegations," he said. "Basically what we're saying that the server they got into is for public access and is in the public side. Although this intrusion is inconvenient, it does not compromise the security of the Senate's network, its members or staff.

“Specifically, there is no individual user account information on the server supporting senate.gov that could have been compromised.”

The US Senate will conduct a review of its websites in response to the hack.

LulzSec, who has publicly attacked Sony in recent weeks, said in a statement that it does not like the US Government as ‘their boats are weak, their lulz are low and their sites aren't very secure'.

“In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more!” said LulzSec in its release on the Senate attack.

“This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


LulzSec accessed public data: US Senate
 
 
 
Top Stories
ATO shaves $4m off IT contractor panel
Reform cuts admin burden, introduces KPIs.
 
Turnbull introduces data retention legislation
Still no definition of metadata to be stored.
 
Crime Commission prepares core systems overhaul
Will replace 30 year-old national criminal database.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  27%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  21%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  25%
TOTAL VOTES: 433

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  54%
 
No
  46%
TOTAL VOTES: 208

Vote