Skip to main content
  1. Home
  2. Computing
  3. Gaming
  4. Legacy Archives

Lizard Squad chased by police, humbled by fellow hackers

Add as a preferred source on Google

The dubious but solid reputation and very integrity of infamous black hat hacking clique Lizard Squad hangs by a thread, according to fresh online reports. Several arrests have been made between late December and last week in relation to denial-of-service attacks on both Sony and Microsoft, and most ironically, the cybercrime ring has lost the privacy of its entire client database to “fellow” hackers.

It sounds like the malicious high-tech reptiles made quite a number of coding-proficient enemies, and slithering their way out of this pickle may prove trickier than all recent DDoS intrusions.

Recommended Videos

Their website takedown tool-for-hire looks DOA, and this comes after a massive leak of Lizard Stresser’s customer list. This includes the unprotected usernames and passwords of over 14,000 registered clients, out of which only a few hundred seem to have actually paid for and “enjoyed” the service.

Remember, we’re talking a decidedly illegal utility here, designed to bring down a domain of choice for up to twenty days in exchange for as little as $6. Questions about how efficient the “stresser” did its job have hovered around it since day one, but we’re guessing no one will bother to find out now.

If you can’t trust the Lizard Squad to defend themselves from external raids, and protect your data, how can you trust them to deliver on the high and mighty DDoS promises?

As far as their legal troubles go, they’re merely beginning and likely set to escalate. In addition to the recent booking made in the UK, two other individuals believed to be part of the squad were picked up. One in the Albion as well, and the second in Finland.

It’s unclear whether they’re still in custody, and the silence of the authorities isn’t particularly encouraging. But the walls are closing in on the Internet vandals that ruined Christmas for gamers. Will they vanish, or will they rejuvenate themselves with new attacks?

Image credit: Matt Cornish/Shutterstock

Adrian Diaconescu
Former Digital Trends Contributor
Adrian is a mobile aficionado since the days of the Nokia 3310, and a PC enthusiast since Windows 98. Later, he discovered…
Asus reveals ROG Strix XG129C, a tiny secondary monitor chasing Elgato’s gamer lunch
The secondary display category has been waiting for a product that combines a proper screen, real color accuracy, and gaming ecosystem integration in one tidy package.
Strix XG129C secondary display.

If you’ve ever wished your work desk had a dedicated screen for reviewing your system’s performance, chat windows, or streaming controls, so that you don’t have to disturb your main monitor, Asus has heard you. 

The ROG Strix XG129C is a 12.3-inch secondary display with a touchscreen, designed to sit beneath your primary monitor and handle everything that could be a distraction on your main screen, and it costs $199. 

Read more
Intel’s turnaround is one for the ages, without having much to show for it
Wall Street is betting big on Intel before the results arrive
Logo

Intel’s comeback has become one of the market’s biggest surprises. Its stock has risen nearly 490% over the past year, pushing the company back into record territory and reviving confidence in a chipmaker many had written off.

The problem is that Intel still has little product success to justify that excitement.

Read more
Apple’s Continuity features are so good, they make Windows and Android feel incomplete
Android and Windows try, but Apple's ecosystem is on a whole different level.
Mac iPad iPhone with blurred background

Windows and Android platforms have been trying to catch up to Apple's ecosystem. And honestly, in some areas, they have succeeded. But replicating a feature here and there is very different from pulling off what Apple has built. The seamless, almost invisible way all of Apple's devices work together is genuinely hard to replicate.

Apple calls these Continuity features. You can use these features to seamlessly transition from one device to another, unlock devices without entering passwords, transfer files, and much more. 

Read more