LulzSec accessed public data: US Senate

Powered by SC Magazine
 

Security review to follow website hack.

The LulzSec hacking group accessed only public data during an attack on the US Senate website over the weekend and did not breach a firewall protecting sensitive information, according to the US Government.

Martina Bradford, the deputy Senate sergeant at arms who provides security for the Senate, said that despite the breach, senator's information was not compromised.

“We were responding to their allegations," he said. "Basically what we're saying that the server they got into is for public access and is in the public side. Although this intrusion is inconvenient, it does not compromise the security of the Senate's network, its members or staff.

“Specifically, there is no individual user account information on the server supporting senate.gov that could have been compromised.”

The US Senate will conduct a review of its websites in response to the hack.

LulzSec, who has publicly attacked Sony in recent weeks, said in a statement that it does not like the US Government as ‘their boats are weak, their lulz are low and their sites aren't very secure'.

“In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more!” said LulzSec in its release on the Senate attack.

“This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


LulzSec accessed public data: US Senate
 
 
 
Top Stories
Microsoft confirms Australian Azure launch
Available from next week.
 
NBN Co names first 140 FTTN sites
National trial extended.
 
Cloud, big data propel bank CISOs into the boardroom
And this time, they are welcome.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  25%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  14%
 
Software development
  27%
TOTAL VOTES: 255

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  63%
 
No
  37%
TOTAL VOTES: 81

Vote