FBI searches LulzSec suspect's home in Hamilton, Ohio

Filed Under: Data loss, Denial of Service, Law & order, Vulnerability

Unhappy shipmateThe international investigation into the notorious LulzSec hacking gang continues, with news that FBI agents have searched a house in Hamilton, Ohio.

According to local media reports, federal agents are said to have searched a teenager's home in Jackson Road, Hamilton, although no-one was charged after the search warrant was served.

Whether the FBI was acting upon information gleaned from Ryan Cleary, the British teenager who was charged last week in relation to a series of denial-of-service attacks, is unclear.

However, there is speculation that US law enforcement officers may have been acting in part based upon information released by the LulzSec group earlier this group, outing members believed to have leaked the group's private online chat logs.

A June 21st posting by LulzSec on PasteBin claimed to reveal the true identities of members who called themselves "m_nerva" and "hann". Apparent real names and addresses were given for both individuals by LulzSec who said:

"These goons begged us for mercy after they apologized to us all night for leaking some of our affiliates' logs. There is no mercy on The Lulz Boat."

In m_nerva's case, his address was listed by LulzSec as being in Hamilton, Ohio.

Part of a statement from LulzSec

A tweet published at the same time as the information was posted indicated that there was little love between LulzSec members and the member they believed had snitched on them.

Hackers, eh? You just can't trust 'em..

With rival hackers apparently turning on each other, and with law enforcement agencies around the world on their tail, it certainly feels as if those who sailed on the Lulz Boat may not be quite so merry as they once were.

, , , , , ,

You might like

6 Responses to FBI searches LulzSec suspect's home in Hamilton, Ohio

  1. philip nyasio-samo · 1557 days ago

    let them (hackers)go to jail.

  2. BattleKOWx509 · 1557 days ago

    this just gets funnier by the day ... Lulz indeed

  3. Riggs · 1557 days ago

    Doesn't surprise me... "Dial 614-LULZSEC" is either a mis-lead or beacon calling card... I figured there would atleast be related activity in Ohio while they determined which it was.

  4. Guser User · 1557 days ago

    Please call the FBI and if they DID actually raid this persons (female?) place, This looks like miss-information that the local paper has reported on and has been picked up by the media, this looks like the information that has been trolled by LulzSEC to hide their tracks.


  5. Guser User · 1557 days ago

    Sorry, my Bad

  6. WippyM · 1557 days ago

    They're all on the run and if one odd person is out-of-step with the rest, that person will get the axe; simple.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

About the author

Graham Cluley runs his own award-winning computer security blog at https://grahamcluley.com, and is a veteran of the anti-virus industry having worked for a number of security companies since the early 1990s. Now an independent security analyst, he regularly makes media appearances and gives computer security presentations. Follow him on Twitter at @gcluley