LulzSec accessed public data: US Senate

Powered by SC Magazine
 

Security review to follow website hack.

The LulzSec hacking group accessed only public data during an attack on the US Senate website over the weekend and did not breach a firewall protecting sensitive information, according to the US Government.

Martina Bradford, the deputy Senate sergeant at arms who provides security for the Senate, said that despite the breach, senator's information was not compromised.

“We were responding to their allegations," he said. "Basically what we're saying that the server they got into is for public access and is in the public side. Although this intrusion is inconvenient, it does not compromise the security of the Senate's network, its members or staff.

“Specifically, there is no individual user account information on the server supporting senate.gov that could have been compromised.”

The US Senate will conduct a review of its websites in response to the hack.

LulzSec, who has publicly attacked Sony in recent weeks, said in a statement that it does not like the US Government as ‘their boats are weak, their lulz are low and their sites aren't very secure'.

“In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more!” said LulzSec in its release on the Senate attack.

“This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?”

This article originally appeared at scmagazineuk.com

Copyright © SC Magazine, US edition


LulzSec accessed public data: US Senate
 
 
 
Top Stories
ATO releases long-awaited Bitcoin guidance
Everyday investors escape the tax man.
 
Why the Weather Bureau’s new supercomputer is a 'gamechanger'
IT transformation starts to reap results.
 
Sydney Trains chief thinks beyond Opal
Plots app to help you find a seat on the train.
 
 
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  67%
 
Advanced persistent threats
  3%
 
Unpatched or unsupported software vulnerabilities
  12%
 
Denial of service attacks
  7%
 
Insider threats
  11%
TOTAL VOTES: 437

Vote