LulzSec hacker 'Sabu' praised by FBI for helping stop more than 300 cyber attacks

The former leader of the elite Anonymous off-shoot was arrested in 2011

James Vincent
Tuesday 27 May 2014 06:06 EDT
Comments
'Sabu' was the former leader of the Anonymous off-shoot
'Sabu' was the former leader of the Anonymous off-shoot

Your support helps us to tell the story

From reproductive rights to climate change to Big Tech, The Independent is on the ground when the story is developing. Whether it's investigating the financials of Elon Musk's pro-Trump PAC or producing our latest documentary, 'The A Word', which shines a light on the American women fighting for reproductive rights, we know how important it is to parse out the facts from the messaging.

At such a critical moment in US history, we need reporters on the ground. Your donation allows us to keep sending journalists to speak to both sides of the story.

The Independent is trusted by Americans across the entire political spectrum. And unlike many other quality news outlets, we choose not to lock Americans out of our reporting and analysis with paywalls. We believe quality journalism should be available to everyone, paid for by those who can afford it.

Your support makes all the difference.

A notorious former member of hacking group Anonymous has been praised by US prosecutors for providing “extremely valuable” assistance to the FBI and thwarting cyber attacks planned by his former associates.

According to court documents Hector Xavier Monsegur, otherwise known as ‘Sabu’, helped law enforcement stop more than 300 separate attacks since his arrest for computer hacking in June 2011.

Mr Monsegur is set to be sentenced today for his involvement in a number of major cyber attacks in the year of his arrest, with prosecutors recommending that he receive a reduced sentence.

In May 2011 Mr Monsegur and five other members of the loosely-defined Anonymous movement formed what court documents describe as “an elite hack collective or ‘crew’ commonly referred to as LulzSec”.

Each of the group’s members had specialized and complementary skills with Mr Monsegur acting primarily as an analyst, exploring the code maintained by LulzSec’s targets in order to find any vulnerabilities.

In 2011 the group struck a number of high-profile targets including Fox, Sony, Nintendo and Senate.gov, receiving extensive media attention for the light-hearted statements they published following these attacks and their apparent refusal to hack for financial profit. Mr Monsegur had previously stolen credit card information to pay his rent and other bills.

LulzSec's mascot and logo, often seen accompanied by their motto "Laughing at your security since 2011".
LulzSec's mascot and logo, often seen accompanied by their motto "Laughing at your security since 2011".

A report on the group’s activities from The Independent in 2011 noted that “like Anonymous, LulzSecurity falls squarely into the grey camp. The group claims to be exposing security vulnerabilities in websites and organisations purely for "fun". But their willingness to dump the stolen data and details they uncover online pushes them towards the black hats.”

Mr Monsegnur was arrested in in June 2011 and reportedly agreed to cooperate with law enforcement immediately. He offered the FBI “information about then-ongoing computer hacks and vulnerabilities in significant computer systems” and "convinced LulzSec members to provide him digital evidence of the hacking activities”.

Court papers detail how “working sometimes literally around the clock,” Mr Monsegur “engaged his co-conspirators in online chats that were critical to confirming their identities and whereabouts,” asking “seemingly innocuous questions that […] could be used to pinpoint their exact locations and identities.”

Mr Monsegnur was also instrumental in 2012 arrest of the hacker Jeremy Hammond, described by the agency as the “number cybercriminal target at the time of his arrest”. Mr Hammond was sentenced to 10 years in prison in November 2013 for hacking US intelligence company Strafor and helping leak internal emails to WikiLeaks.

Join our commenting forum

Join thought-provoking conversations, follow other Independent readers and see their replies

Comments

Thank you for registering

Please refresh the page or navigate to another page on the site to be automatically logged inPlease refresh your browser to be logged in