The arrests, if legit, could have a significant impact on hacking. Hackers may not be as willing to trumpet their activities - a major driver of hacktivism. Further, it may impede recruitment of new hackers who could now be a little more gun shy.
The arrests shouldn't surprise anyone. They made two errors:
Mistake #1: They brought too much attention to themselves.
It is said that John Gotti, the mafia boss, brought so much attention to himself that he became a natural, high profile target for law enforcement. As Amichai Shulman, our CTO, stated before, the Lulzsec, the hackers "were extremely unfocused in their goal and gained attention mainly due to the relative intensity of their activity and lack of other good media topics." They brought too much attention to themselves and you could expect law enforcement to find them. If you look at hacking historically, over the past 20 years many of the high-profile attacks or those that involve serious losses to governments or commercial companies have ended up with law enforcement finding the perpetrators eventually, such as Albert Gonzalez.
Mistake #2: They didn't cover up their tracks.
Let's review some of the Lulzsec chat logs from a few months ago. One snippet, in reference to discussions Lulzsec was having with the media, shows how the hackers themselves admit they gave away too much information:
Topiary - "Sabu and I got a bit carried away and gave LulzSec away a bit."
As Imperva's Tal Be'ery, Web Research Team Leader, Application Defense Center (ADC) said in this USA Today article, "When you're running this kind of operation for a long time, especially with not very concrete plans, you're bound to make mistakes." The mistakes Lulzsec and Anonymous made during their hacking spree left an electronic trail with enough foot prints to product today's arrests.
Follow the Imperva blog for the full story.
Press releases you might also be interested in
Weitere Informationen zum Thema "Sicherheit":
Hochsichere Linux-Distributionen im Überblick
Linux gilt als sehr sicheres Betriebssystem, aber manchmal gibt es Einsatzgebiete, für die es ein noch sichereres System braucht. Wer vertraulich arbeiten und kommunizieren muss, oder die Sicherheit des eigenen Netzwerks überwachen will, greift zu speziellen Linux-Distributionen wie z.B. Qubes OS, Tails oder Whonix. Wir stellen einige der bekanntesten und besten Distributionen in diesem Bereich vor.Weiterlesen