contentmart-banner

Exclusive News Security

LizardSquad’s DDoS tool falls prey to hack, exposes complete customer database

7562831366_66f986c3ea_o
Share on Facebook
Tweet about this on TwitterShare on Google+Share on StumbleUponShare on LinkedInPin on PinterestShare on Reddit

7562831366_66f986c3ea_o

If you  conceive a fire, you better prepare yourself to stray away from its flames. Maybe LizardSquad failed to learn this elementary lesson and underestimated the consequences that a rising popularity brings along.

LizardSquad, the hacker group that earned its fame from Playstation and XBox web portals hack, last month mentioned the intentions behind its notorious activities saying that it just wanted to catch a little attention for its tool dubbed “Lizard Stresser”.

Lizard Stresser is a tool developed by Lizard Squad which holds the potential to execute similar DDoS attacks that the group made on PlayStation and Xbox websites. Now reports have surfaced that the tool that was supposed to hack other websites, has fallen prey to a powerful attack, revealing all of the customer’s information who registered themselves to get access to the tool. Well, Lizard Squad isn’t the only player in this arena, that’s evident.

A copy of the Lizard Stresser customer database obtained by KrebsOnSecurity says that it has more than 14,241 registered users during its first month of operation. Krebs also notes that the entire database was ironically stored in plain text, thus exposing usernames and passwords of LizardSquad’s entire customer database.

It has been further identified that LizardStresser, the tool which this novice hacker group was using, has been taken as-it-is from TitaniumStresser’s source files.

The registered clients are now under a potential threat as much as the sites they paid to take down. Their identities are not a secret anymore (until and unless passwords have been changed).

IMAGE : FLICKR / CC 2.0 / Merrill College of Journalism

 

Number of posts published by user: 611

Senior Writer

Add Comment

Click here to post a comment

Your email address will not be published. Required fields are marked *