Hacking group LulzSec has announced it has disbanded amid reports that law enforcement is closing in.
The group said the split, which marked 50 days since it formed, was planned.
It also posted to Bit Torrent what it said would be the last of a string of data caches stolen from online sources.
Since its inception, LulzSec had stolen and published sensitive information from dozens of high profile organisations including Fox, PBS, Sony and the CIA.
The last cache contained troves of AT&T documents including information on its 4G LTE deployment, and details on some 90,000 IBM phones, internal emails, memos and reports.
Also stolen was an AOL internal technical document, and hundreds of thousands of usernames and passwords of which 200,000 were swiped from HackForums.net and 50,000 from unnamed video game forums.
HackFoums.net had reset user passwords.
The group’s actions had sparked the ire of other groups and individuals who claimed to have uncovered information on LulzSec members and provided the details to police.
Last week a man reported to be an affiliate of the group, Ryan Clearly, was arrested by Scotland Yard for computer crimes related to the LulzSec hacks.
The personal details of individuals alleged to be members of the group have been posted online in what is referred to as doxing attacks.
The group made no mention of the reported crackdown by law enforcement, and noted it hopes the online Anti-Security Movement campaign in which it participated would continue.
“Thank you for sailing with us. The breeze is fresh and the sun is setting, so now we head for the horizon,” the group wrote.
Copyright © SC Magazine, Australia
Issue: 334 | December 2014
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.