Skip to main content

LulzSec now taking phone requests for DDoS attacks

lulzsec-tupac-pbsUPDATE: The CIA’s website currently appears to be down and LulzSec has claimed responsibility via Twitter.

Lulz Security , better known as LulzSec, the unscrupulous hacker group whose targets have ranged from porn sites to PBS, is now taking requests over the phone. In a tweet posted yesterday, LulzSec unveiled a phone number where people could call in and leave the name of a target website. If LulzSec approved, it was suggested that the hacktivist group would then initiate a distributed denial of service (DDoS) attack to render the site inaccessible.

“Call into 614-LULZSEC and pick a target and we’ll obliterate it. Nobody wants to mess with The Lulz Cannon – take aim for us, twitter,” read LulzSec’s tweet. The number’s area code points to the Colombus, Ohio area, however, it’s not at all likely that any members of LulzSec are actually based there. Throughout the day today, the group’s Twitter feed has many several mentions of the hotline number, encouraging followers to call in with requests.

We called the number (but didn’t leave a message, obviously) and were greeted by a voicemail message spoken by a “Pierre Dubois” in a French accent of questionable authenticity. LulzSec has claimed that it took down a total of eight websites handpicked by its followers on the first day of the hotline’s existence. LulzSec also boasted that the number has received over 5,000 missed calls and taken in some 2,500 voicemail messages.

LulzSec’s decision to field DDoS requests over the phone may at first seem like an open invitation to be cornered by the authorities. But, in age where anyone can establish a Google Voice number, it’s also likely that a voicemail system is likely just as secure than most methods possible through the Internet. LulzSec hasn’t said if the hotline will become a permanent fixture in the group’s ongoing quest for “maximum lulz.”

Editors' Recommendations

Aemon Malone
Former Digital Trends Contributor
Cloudflare just stopped one of the largest DDoS attacks ever
Hands on a laptop.

Cloudflare, a company that specializes in web security and distributed denial of service (DDoS) attack mitigation, just reported that it managed to stop an attack of an unprecedented scale.

The HTTPS DDoS attack was one of the largest such attacks ever recorded, and it came from unusual sources -- data centers.

Read more
Microsoft stopped the largest DDoS attack ever reported
Nvidia T4 Enterprise Server Wall

Distributed Denial-of-Service (DDoS) attacks have become more common, and Microsoft recently published a blog post looking into the trends for such attacks on its own servers. In that post, the company says that, at one point, it stopped one of the largest-ever-recorded DDoS attacks on a Microsoft Azure server in Asia.

According to Microsoft's data, in November, an unnamed Azure customer in Asia was targeted with a DDoS attack with a throughput of 3.47 Tbps and a packet rate of 340 million packets per second (pps.) The attack came from 10,000 sources from multiple countries across the globe, including China, South Korea, Russia, Iran, and Taiwan. The attack itself lasted 15 minutes. Yet it is not the first one of such scale, as there were two additional attacks, one of 3.25 Tbps and another of 2.55 Tbps in December in Asia.

Read more
Cloudflare reports a massive 175% increase in DDoS attacks
Person using laptop with security graphics in front.

Cloudflare, a web infrastructure and security company, has just released a report titled "DDoS Attack Trends for Q4 2021." According to Cloudflare, 2021 has been a particularly bad year in terms of DDoS attacks.

Ransom distributed denial of service (DDoS) attacks increased by over 175 percent quarter over quarter, highlighting the large scale of the problem described by Cloudflare.

Read more