LulzSec after making noise on launching several high-profile hacking activities starting with Sony Corp to the rest of other video game creators is still leading the headline but this time, they are to take revenge to the hackers who attacked Sega Corp.
Sega Corp is a division of Japan’s Sega Sammy Holdings who became popular through their aging video game called “Dreamcast.”
The hackers, whose group and identity is still under investigation, had put several personal data account from Sega P(–foul word(s) removed–) online in compromise. Reports said that some e-mail addresses and birthdays which were saved in plain text were at risks. However, the p(–foul word(s) removed–)words were indeed safe for it was saved via encryption.
Sega’s P(–foul word(s) removed–) network was put to ‘offline’ stage and was shut down on Thursday right after the intrusion was found out. And up to this time, the comeback operation of the said site is not yet announced.
Popular hacking group, the LulzSec had expressed their support for Sega Corp as they tweeted on their Twitter account: “Sega – contact us. We want to help you destroy the hackers that attacked you. We love the Dreamcast, these people are going down.”
This recent declaration had created a new twist on this chain of hacking activities. As FBI will be called to conduct investigations, they will have competitors on the field when it comes to gathering of important information to trace the group responsible for Sega breach and this time, they are to compete with LulzSec members.
“Dreamcast”, Sega Corp’s developed game might be aging but it’s not surprising if even LulzSec still plays with it despite new games introduced and available.
Way back in 1990’s, Sega Corp was one of the biggest creator of video game console but their fame fade when games from Sony Corp and Nintendo was introduced. Now, Sega Corp had changed their path and focused on creation of game systems for other companies.
With this recent surprising announcement coming from LulzSec, it’s exciting to note how hacking activities could bring revenge and on how two groups of hackers will be able to trace and to defend each other in order to protect their interests.