Hack attack on Sony and Xbox 20 January 2015 Lizard Squad hacking group was hit by embarrassing attack that exposed the entire database of users. The group claimed to have taken off the PlayStation and Xbox gaming networks during the Christmas period. After that, it set up a website that allowed anyone who paid for its software to flood other websites with information. The attack that exposed the list of customers is only one of the many targeted at the group or its tools. Address list Brian Krebs, an investigative journalist, broke the news about the hacking of the Lizard Stresser database. The Stresser allowed those who paid for it to overload websites or remove users from their sites with information. Krebs didn't name the individual who obtained the data, but said that he'd a copy of the entire roster of 14,241 people who signed-up. Anyone who visited the Stresser website was warned of the attack by text on the login page's main page that advised users to change their passwords they created when they registered. Krebs wrote in a blog post the Lizard Squad had not taken enough precautions to safeguard the login information and contact details given by users. Minecraft "All registered usernames and passwords were stored in plain text," said Mr Krebs and added that only a few hundred of those who signed up paid for the service. Tech news site Ars Technica also got hold of the database dump, which was released on the Mega file-sharing system. It said that the majority of people who utilized it were gamers trying to stop their opponents from playing a specific game. Minecraft servers were a popular target for the Stresser users, it said. Ars Technica stated that the dump of the database could cause problems for anyone who had access to it, since many IP addresses were poorly hidden and could be recovered with some effort. Then, shortly after Lizard Squad was attacked on IRC chat networks, other computer experts dismantled the tools. One revealed the source program's code to attack users on IRC chat networks. Eric Zhang, a computer science student was able to quickly identify the names of all those who registered for Stresser using an extremely simple script. He said, "That took only 10 minutes." He said that he wasn't surprised that the entire database had been stolen, as he scanned the website and found that public access to the server was accessible. JASON He stated that the site was run by a person who had no formal experience in software engineering. He added, "Most of their work isn't very impressive." "Anyone could do this. All it takes is time." Mr. Krebs said that Lizard Squad was being targeted because security officers were dissatisfied by their sudden fame. He said: "There seems to be a general sense in the security research community that these guys are in way over their heads and that if we can't bring to justice a bunch of teenagers from Western nations who are rubbing it in everyone's faces it's a sad state of affairs." However, he added, the time it took to conduct investigations and find members of the group had made it more resilient. Recent arrests of Lizard Squad members seemed only to have snatched a few of its hangers-on but had let a few of its core members remain at large. UK man is arrested in connection with Sony hack 16 January 2015 Sony hackers 'shared' stolen logins 30 December 2014 PlayStation rebuild service 27 December 2014 Brian Krebs Eric Zhang