LulzSec breaches Nintendo security

The LulzSec boat was busy this weekend, hacking Nintendo’s servers and finding time to hit back at the US government for declaring cyber attacks will be met with military might.

The group made another marquee name breach, with Nintendo admitting that it was subject to a security breach at the weekend.

It is not thought that significant damage was caused to the firm’s operations, with the company stating that “the server contained no consumer information”. However,  it will certainly be a worrying development for yet another major firm.   

LulzSec said in a Twitted post that it had not intended to cause significant upheaval to the site, apparently agreeing that consumer information not though to have been at risk, with the firm not drawing the same level of vitriol as Sony.

‘We’re not targeting Nintendo. We like the N64 too much — we sincerely hope Nintendo plugs the gap.”

LulzSec has claimed responsible for a raid on Sony’s servers in the past, following an initial attack, and it indeed appears that such activities are beginning to take a toll on the firm’s finances.

Following yet another attack over the weekend it was also announced that the firms shares plummeted to their lowest level in two years, with Tokyo trade down 3.14 percent to close at 2,062 yen according to AFP.

“It is true that the website was illegally accessed,” said a Sony spokesperson. “But all the data that the hacker seems to have copied was information already available on the company website.”

The busy group also found time to hack the FBI affiliated InfraGard Atlanta site, leaking a number of passwords in what it views as a direct retaliation to the announcement recently by Barack Obama that severe breaches of cyber security will be met with force.

LulzSec claimed that “While not very many logins (around 180), we’d like to take the time to point out that all of them are affiliated with the FBI in some way”.

The group also gave site members a ticking off for using the same passwords on multiple sites, which LulzSec were able to use to gain access to personal and work emails Karim Hijazi, CEO of Unveillance, a network security company.

Hijazi now claims that the group used control of his site to extort money from him, while LulzSec claimed that he offered them money to start DDOS attacks on his rivals.

The InfraGard site, another scalp for the group which has been highly active recently, is still offline this morning, with a message stating that it is under construction.