After Sega gets hacked, LulzSec offers to seek revenge
The hacking free-for-all continues, as Sega apparently becomes the latest victim of a network breach and none other than hacking group LulzSec offers to help the game company by taking down the responsible parties.
Edward MoyerSenior Editor
Edward Moyer is a senior editor at CNET and a many-year veteran of the writing and editing world. He enjoys taking sentences apart and putting them back together. He also likes making them from scratch. ¶ For nearly a quarter of a century, he's edited and written stories about various aspects of the technology world, from the US National Security Agency's controversial spying techniques to historic NASA space missions to 3D-printed works of fine art. Before that, he wrote about movies, musicians, artists and subcultures.
Ed was a member of the CNET crew that won a National Magazine Award from the American Society of Magazine Editors for general excellence online. He's also edited pieces that've nabbed prizes from the Society of Professional Journalists and others.
The hacking free-for-all continued this week as Sega apparently became the latest victim of a network breach and none other than hacking group LulzSec offered to help the game company by taking down the responsible parties.
The blog PlayStation LifeStyle posted yesterday what it said was a letter sent by Sega to users of its Sega Pass service, informing them that "unauthorized entry was gained" to the Sega Pass database and that the company is investigating.
"We have identified that a subset of Sega Pass members' e-mail addresses, dates of birth, and encrypted passwords were obtained," the letter reads. "To stress, none of the passwords obtained were stored in plain text. Please note that no personal payment information was stored by Sega, as we use external payment providers, meaning your payment details were not at risk from this intrusion."
The hack would be the latest in a recent explosion of such activity, which has skewered the likes of entertainment giant Sony, defense contractor Lockheed Martin, the U.S. Senate, and the FBI, among others.
The letter doesn't say who might be behind the intrusion; it simply continues with news on how Sega is responding to the hack, along with a couple of cautions:
If you use the same login information for other websites and/or services as you do for Sega Pass, you should change that information immediately.
We have also reset your password and all access to Sega Pass has been temporarily suspended.
Additionally we recommend you please take extra caution if you should receive suspicious e-mails that ask for personal or sensitive information.
As of this writing the Sega Pass service is in fact offline, but a notice says only that the service "is going through some improvements so is currently unavailable for new members to join or existing members to modify their details including resetting passwords." It also says Sega hopes to have Sega Pass "back up and running very soon."
Underscoring the current out-of-control atmosphere surrounding cybersecurity, LulzSec followed that tweet not long after with a note updating the phone numbers of the request-a-hack hotlines the group had set up earlier in the week.