Skip to content

Website breach confirmed by cybersecurity team

Coordinating entity linked to the FBI, responsible for information exchange between businesses and the government to thwart cybercrime, has verified its online platform

Digital security experts verify successful website breach
Digital security experts verify successful website breach

Website breach confirmed by cybersecurity team

Lulz Security, the notorious hacker group known for their high-profile cyber attacks, has struck again. This time, their target was the Atlanta arm of InfraGard Members Alliance.

The hack, confirmed by InfraGard Atlanta Members Alliance President Paul Farley in an email exchange with the Associated Press, involved the compromise of InfraGard's website. Lulz Security posted over 150 passwords of InfraGard members on their website, and it is still unknown how the attack occurred.

Lulz Security, often abbreviated as LulzSec, is a group known for their cyber attacks carried out mostly for entertainment or "lulz" rather than financial gain or political motives. They became widely known around 2011 for breaching various corporations and organizations, emphasizing vulnerabilities in cybersecurity through their attacks.

Notable cyber attacks attributed to Lulz Security include breaches of major corporations such as Sony, exposing their internal vulnerabilities and causing significant public attention. They also attacked media organizations, such as PBS, demonstrating their ability to disrupt and expose institutional weaknesses. In June 2025, Lulz Security released a large cache of about 26,000 email addresses and passwords from various pornographic websites, including sensitive email addresses from government and military officials, raising concerns about cybersecurity practices among those responsible for national defense.

In 2011, they also doxed over 73,000 potential contestants of the TV show "The X Factor," releasing personal information publicly. Their hacking activities blend data breaches and doxing (the release of personal information), often delivered with a provocative and comedic tone aimed at highlighting security flaws and human vulnerabilities in digital security systems.

The method used to reveal the passwords of InfraGard members is currently unknown. However, it is known that the stolen emails were from one member who reused his passwords across multiple systems. Lulz Security claimed control over the InfraGard Atlanta chapter's website and defaced it, stating the attack was in retaliation to NATO and the US government's characterization of cyber attacks as "acts of war."

The FBI's affiliate organization for information sharing, InfraGard Members Alliance, has not yet commented on the hack's impact or the steps they are taking to secure their systems moving forward. This incident serves as a reminder of the importance of strong password practices and the ongoing need for robust cybersecurity measures to protect sensitive information.

[1] Reference for the 2025 password leak: https://www.wired.com/2011/06/lulzsec-hacks-nato-releases-26000-emails-passwords/ [2] Reference for the X Factor doxing: https://www.theguardian.com/media/2011/jul/25/lulzsec-x-factor-contestant-data-leak

  1. This unexpected cyber attack on InfraGard Atlanta Members Alliance, involving the leak of over 150 passwords, underscores the critical role technology plays in today's general-news landscape, particularly in the realm of crime-and-justice.
  2. The compromised passwords from InfraGard members, believed to be stolen through yet-unknown means, should serve as a stark reminder for all organizations to prioritize cybersecurity practices, especially in the face of advanced hacking groups like Lulz Security.

Read also:

    Latest