Fact-checked by Grok 2 weeks ago

Lizard Squad

Lizard Squad was an informal collective of adolescent hackers active primarily in 2014–2016, specializing in distributed denial-of-service (DDoS) attacks launched via self-operated "booter" services that rented computational power to overwhelm target networks. The group claimed responsibility for disrupting major online gaming platforms, including simultaneous outages of Microsoft's Xbox Live and Sony's on December 25, 2014, which prevented millions of users from accessing services during peak holiday demand. Beyond gaming targets, Lizard Squad conducted attacks on entities such as ' website via and collaborated on "swatting" incidents involving false emergency reports to provoke armed police responses. Key members included Finnish national Aleksanteri Kivimäki (also known as Julius Kivimäki or "zeekill"), convicted in 2015 on over 50,000 counts of unauthorized access and data interference related to Lizard Squad operations, receiving a suspended juvenile sentence; Canadian teenager Morgan Pope, who pleaded guilty in 2015 to 23 charges encompassing swatting, extortion, and DDoS facilitation; and Americans Zachary Buchta and Austin Alcala, charged in 2016 for running Lizard Stresser and affiliated sites, with Buchta later sentenced to three months' imprisonment in 2018 after admitting to conspiracy in DDoS-for-hire schemes. These prosecutions, stemming from international investigations by U.S., Finnish, and other authorities, highlighted the group's reliance on rented server networks and public boasts on platforms like Twitter, which aided law enforcement tracing. The collective's activities exemplified early of DDoS tools, enabling low-barrier disruptions for profit or notoriety, though member convictions underscored vulnerabilities in operational among self-taught perpetrators lacking sophisticated . No links the group to state-sponsored motives or advanced persistent threats; instead, attacks aligned with opportunistic, youth-driven disruption patterns observed in contemporaneous scenes. Post-arrests, Lizard Squad fragmented, with some ex-members pivoting to unrelated crimes, reflecting the transient nature of such groups.

Origins and Early Activities

Formation and Initial Claims

Lizard Squad emerged in as a loose collective of hackers focused primarily on distributed denial-of-service (DDoS) attacks against online gaming services. The group gained initial visibility through its account @LizardSquad, which began posting claims of disruptions around August 2014. No precise formation date has been publicly documented, but their activities suggest assembly from individuals experienced in operations and stresser tools, drawing from broader underground hacking communities. The group's earliest documented claims involved DDoS attacks on major gaming platforms, including Sony's (PSN), Blizzard's , and Riot Games' servers. On August 24, 2014, Lizard Squad tweeted responsibility for outages on PSN, warning of further actions and threatening Xbox Live as a potential next target. These claims aligned with reported service interruptions, though attribution relied heavily on the group's self-proclaimed boasts via rather than independent forensic confirmation at the time. Concurrently, Lizard Squad escalated publicity with a bomb threat on August 24, 2014, targeting Flight 395 carrying John Smedley, president of Sony Online Entertainment. The tweet prompted the plane's emergency diversion and landing in , leading to FBI involvement. This incident, while not a cyber disruption, underscored the group's tactic of combining technical attacks with social engineering for maximum attention, though it was later classified as a false threat with no explosives found.

Emergence in Hacking Scene

Lizard Squad emerged publicly in the scene during 2014, when the group began claiming responsibility for distributed denial-of-service (DDoS) attacks against prominent online gaming platforms. Initial targets included Online Entertainment's network, Blizzard Entertainment's , Riot Games' servers, and . These disruptions, executed using rented botnets and stresser tools to flood servers with traffic, marked the group's shift from obscurity to notoriety, as they leveraged (@LizardSquad) to broadcast claims and mock affected companies. A pivotal early incident occurred on August 24, 2014, when Lizard Squad tweeted a targeting Flight 3950, carrying Sony Online Entertainment president John Smedley from to . The , posted from the group's account, prompted the flight's emergency landing in and an FBI investigation into the perpetrators. This escalation from digital sabotage to public safety hoaxes amplified the group's profile, drawing media attention and distinguishing them from routine DDoS actors. The FBI classified the act as a credible at the time, though it was later confirmed as a fabrication intended to provoke. While some reports indicate Lizard Squad formed as early as mid-2013, their pre-2014 activities involved lower-profile operations lacking widespread documentation or verification. Within the broader community, the group was frequently derided by more technically adept actors as "script kiddies" or "skiddies," reliant on off-the-shelf DDoS-for-hire services rather than custom exploits or zero-day vulnerabilities. This perception stemmed from their emphasis on volume-based attacks over sophisticated intrusion techniques, yet their bold claims and media savvy secured a foothold in underground forums and social channels.

Operational Methods

DDoS Techniques and Infrastructure

Lizard Squad employed volumetric distributed denial-of-service (DDoS) attacks, primarily through stresser and booter services that flooded targets with excessive traffic to overwhelm network resources. These attacks utilized flooding mechanisms such as floods, floods, HTTP floods, and junk floods, which generate high-volume packets to exhaust and server capacity. techniques, including DNS and NTP , were supported by the tools they accessed, enabling smaller inputs to produce disproportionately large response traffic via IP spoofing and mapping. The group's infrastructure centered on botnets assembled from compromised Internet-connected devices, particularly small office/home office () routers running with unchanged default credentials like "admin/admin" or "root/12345." variants, documented as early as early 2014, propagated via scans to infect vulnerable routers, including those at and businesses, forming a distributed for sustained attacks capable of peaks exceeding 200 Gbps. Hosting for control panels occurred on bulletproof networks, such as those in Bosnia, providing against takedowns. Additional resources included rented services like vDos and Shenron, which offered scalable attack durations from seconds to hours and guaranteed for VIP users. These methods relied on the proliferation of insecure and router devices, allowing low-cost assembly of botnets without sophisticated custom , though the resulting attacks disrupted major targets by saturating ingress pipes rather than exploiting application vulnerabilities.

LizardStresser Service

LizardStresser was a DDoS-for-hire service launched by the Lizard Squad on December 31, 2014, immediately following the group's high-profile disruptions of Xbox Live and over Christmas. The service, hosted at lizardstresser.su, enabled subscribers to initiate DDoS attacks against targeted websites or online services, marketed ostensibly as a network stress-testing tool but primarily facilitating malicious disruptions. Access required payment via subscription models starting at $6 per month, with options for short-term attacks costing as low as $3 to temporarily overwhelm a site's . The service's infrastructure reportedly relied on a comprising thousands of compromised home routers and potentially hijacked webcams, amplifying potency through distributed floods that mimicked legitimate surges to evade basic defenses. Lizard Squad promoted LizardStresser via and underground forums, positioning the earlier network outages as demonstrations of its effectiveness to attract customers seeking retaliatory or competitive takedowns in online communities. User registrations included storage of usernames and hashed passwords, reflecting rudimentary practices that exposed the platform to rapid compromise. On January 19, 2015, LizardStresser itself suffered a when an intruder, reportedly from the forum Doxbin and identified as "nachash," accessed and leaked the site's database containing details of over 100 registered users, including their payment information and attack histories. The leak, publicized by security researcher , revealed the service's customer base and prompted backlash within circles, contributing to its swift operational shutdown by late January 2015. This incident underscored the precarious nature of such illicit platforms, where internal rivalries and poor opsec amplified vulnerabilities beyond external law enforcement pressures.

Verified Disruptions

Christmas 2014 Attacks on Xbox Live and PlayStation Network

On December 25, 2014, the Lizard Squad launched distributed denial-of-service (DDoS) attacks targeting Microsoft's Xbox Live and Sony's (PSN), causing extensive outages that prevented millions of users from accessing online features during the Christmas holiday. The group had issued threats earlier in December via , warning of disruptions to both platforms on or Day to maximize impact on peak user activity. The assaults overwhelmed the networks with traffic floods, rendering login, multiplayer, and other services unavailable; Xbox Live reported partial functionality by late afternoon but with persistent issues, while PSN remained largely offline through December 26. Lizard Squad publicly claimed credit through real-time updates, including posts at 6:13 p.m. on December 26 stating "ALL ATTACKS ON PSN AND XBOX HAVE STOPPED," coinciding with observed service recovery. The timing aligned precisely with the group's prior announcements, confirming their role via matching outage patterns reported by affected users and platform status pages. Microsoft and Sony both attributed the incidents to DDoS attempts in official statements, with Microsoft noting efforts to reroute traffic and bolster defenses, and Sony confirming investigations into the external assault. Services began stabilizing by December 27, though full recovery varied by region and feature. The attacks, which potentially impacted over 100 million active users across both ecosystems, were later linked by investigators to Lizard Squad's promotion of their paid LizardStresser DDoS tool, using the high-profile disruption as a demonstration of capability. The cessation of attacks followed an intervention by founder , who publicly offered Lizard Squad members free premium vouchers for his on , after which the group announced the halt—suggesting a transactional motive over ideological disruption. This event marked one of the most notable synchronized takedowns of major gaming networks, verified through contemporaneous platform acknowledgments, user reports, and the group's own documented boasts.

Attacks on Tor Network, Malaysia Airlines, and Daybreak Games

In December 2014, Lizard Squad claimed responsibility for launching distributed denial-of-service (DDoS) attacks against Tor network relays as part of their broader campaign targeting online services during the Christmas period. The group asserted that the assaults rendered parts of the Tor infrastructure unavailable, aligning with their simultaneous disruptions to gaming networks. However, the Tor Project reported that the attacks had only minimal impact on overall network availability, attributing this to Tor's decentralized design and resilience against such volumetric attacks. On January 26, 2015, Lizard Squad, operating under the banner "Lizard Squad - Official ," compromised the website, replacing its homepage with an image of a lizard in a and the message " - plane not found," a reference to the airline's earlier tragedies involving missing flights MH370 and MH17. The defacement also included claims of accessing internal email accounts and threats to release passenger data, though no such dump materialized. The site remained offline for at least seven hours, prompting to investigate and restore services while denying any breach of passenger databases. In February 2015, Lizard Squad resumed operations by conducting DDoS attacks on Daybreak Games (formerly Online Entertainment), disrupting access to titles such as and . These strikes, which coincided with assaults on Xbox Live, overwhelmed the company's servers, leading to extended outages and player downtime reported across forums and official channels. Daybreak confirmed the DDoS nature of the interference and implemented mitigation measures, though the group boasted of the attacks' success via .

Unverified Claims and Fabrications

Bomb Threats and Public Safety Hoaxes

In August 2014, the Lizard Squad issued a hoax bomb threat via against Flight 362 en route from Dallas-Fort Worth to , claiming the aircraft carried explosives. The targeted flight carried John Smedley, president of Sony Online Entertainment, amid concurrent DDoS attacks on the . The threat prompted the plane's diversion to , where passengers were evacuated and the aircraft searched by authorities; no explosives were discovered, confirming the claim as a fabrication intended to amplify disruption. This incident endangered passengers and diverted resources, exemplifying the group's tactic of leveraging false alarms for publicity and intimidation. Beyond aviation threats, Lizard Squad members engaged in swatting, a form of public safety hoax involving fabricated emergency reports to provoke armed police responses. In 2015, a 17-year-old Canadian identifying as a Lizard Squad affiliate pleaded guilty to 23 counts of such offenses, primarily targeting female players of the online game . These hoax calls falsely alleged shootings, stabbings, or bombs at victims' residences, resulting in team raids that risked lives through unnecessary confrontations. The spree, which included an eight-hour live-streamed swatting incident, highlighted the group's use of deception to harass rivals in gaming communities, with no genuine threats materializing. Such actions strained emergency services and underscored the hoax nature of their public safety manipulations, distinct from verifiable cyber disruptions.

False Attributions to Major Platforms and Celebrities

Lizard Squad asserted responsibility for a global outage on and on January 27, 2015, tweeting "HELLO" alongside images suggesting control over the platforms' infrastructure. The disruption prevented users from accessing the services for about an hour, sparking widespread media coverage and user panic. spokesperson Frederic Wolens refuted the claim, confirming the issue stemmed from an internal configuration change rather than any external . This incident exemplified Lizard Squad's pattern of claiming unverified disruptions to major platforms, which rely heavily on endorsements and from high-profile figures. No direct, substantiated claims by Lizard Squad targeting individual celebrities' personal accounts or services were confirmed, though their boasts often leveraged the platforms' cultural significance to celebrities for notoriety. Investigations into group activities, including U.S. Department of charges against members, focused primarily on DDoS operations rather than targeted intrusions against celebrity assets.

Membership and Identifications

Key Identified Individuals

Julius Kivimäki, a national born in 1996, was identified as a prominent Lizard Squad member operating under the pseudonym "." In 2015, a Finnish court convicted him on 50,700 counts of unauthorized access to computer systems, stemming from his role in compromising thousands of user accounts on the site Suomi24 between 2013 and 2014, actions linked to Lizard Squad's broader operations. Despite the volume of charges, Kivimäki received no prison time due to his age at the time (under 18), instead facing a fine and community service; the court noted the offenses' preparatory nature for more severe crimes but emphasized his youth as mitigating. Zachary Buchta, an American from , known online as "@ObscureAnachronism" and "@FBIaReLosers," was charged in connection with Lizard Squad's DDoS-for-hire services and related activities, including operating the Lizard Stresser platform. Arrested in 2016 as part of an international probe, Buchta cooperated with authorities, providing information that aided in identifying other members, which reduced his potential 10-year sentence to three years of probation in March 2018; he was also ordered to pay nearly $350,000 in restitution for damages caused by attacks on victims like gaming networks. His involvement extended to incidents and hoaxes tied to the group, though cooperation mitigated harsher penalties. Austin M. Alcala, a 19-year-old from , was arrested on October 5, 2016, alongside a minor, for conspiring to operate unauthorized stresser services under Lizard Squad and affiliated PoodleCorp, including LizardStresser and PoodleStresser, which facilitated DDoS attacks worldwide. The U.S. Department of Justice charged Alcala with and abuse, alleging the platforms generated revenue through subscriptions for attack tools used against targets like financial institutions and gaming services; servers hosting these sites were seized during the operation. Alcala's case highlighted Lizard Squad's commercialization of cyber disruptions, with charges carrying potential sentences of up to 10 years. A Canadian juvenile, whose identity was protected due to age, pleaded guilty in May 2015 to 23 counts of related to incidents—false emergency calls prompting armed police responses—explicitly identifying himself as a Lizard Squad member in online communications. These actions targeted individuals in and the U.S., causing significant diversion; the avoided a full , with sentencing details limited by protections for minors.

Internal Dynamics and Pseudonyms

Lizard Squad functioned as a loose, informal of primarily teenage and young adult hackers, driven more by the pursuit of online fame and disruption than by structured organization or profit motives. Members coordinated via anonymous online forums such as Hackforums and real-time social media platforms like , where they boasted about attacks to amass followers rapidly—gaining over 50,000 in 24 to 48 hours during peak activity in late 2014. This ad hoc structure allowed quick mobilization for distributed denial-of-service (DDoS) operations but lacked formal leadership or defined roles, resembling a "stunt hacking" group akin to earlier collectives like , with emphasis on publicity over technical sophistication. Pseudonyms were central to members' and online personas, often shared across communities. Prominent aliases included "" (linked to hacker Julius Kivimäki, also known as "Zee," "Zeekill," or "Ry|an"), "Vinnie" (used by UK-based Vinnie Omari on Hackforums), "," "sp3c" (associated with forum administration and core operations), "Komodo," and "" (implicated in specific intrusions like router hacks). Other reported handles, such as "Criminal," "Jordie," "Pain," and "Plague," surfaced in media attributions of group communications. These aliases facilitated collaboration on tools like LizardStresser, a DDoS-for-hire service launched in December 2014, but also exposed rifts when rivals or defectors—using handles like "KMS" or "Starfall"—leaked databases or disrupted operations. Internal tensions manifested in opportunistic behaviors, such as accepting approximately $300,000 in vouchers from founder on December 25, 2014, to halt attacks on Xbox Live and , revealing pragmatic deal-making over ideological commitment. The group's dynamics were further strained by external pressures, including hacks on their own infrastructure—exposing LizardStresser customer data in January 2015—and law enforcement scrutiny, which fragmented cohesion without evident infighting among core members until arrests began in 2015. Overall, Lizard Squad's operations reflected the transient nature of underground crews, where pseudonym fluidity and social media bravado prioritized short-term spectacle over long-term stability.

Investigations and Arrests

Following the distributed denial-of-service (DDoS) attacks attributed to Lizard Squad in December 2014, the (FBI) initiated probes into the group's operations, focusing on their use of booter services to facilitate attacks on gaming networks and other targets. These efforts involved international cooperation with agencies such as the Dutch Prosecutor's Office, targeting the infrastructure behind Lizard Squad's stresser tools that enabled paying customers to launch DDoS floods. In July 2015, Finnish courts convicted 19-year-old Julius Kivimäki, known online as "zeekill" and linked to Lizard Squad's early activities, on more than 50,000 counts of aggravated data and traffic espionage, as well as juvenile offenses related to DDoS attacks conducted via the group's tools against various websites. Kivimäki received a of one year and six months, reflecting his role in high-profile disruptions tied to the group's formation. That August, British police arrested six teenagers aged 17 to 19 in southwest on suspicion of using Lizard Squad's Lizard Stresser service to target websites and online services with DDoS attacks, as part of a broader crackdown on users of the group's for-hire tools; the suspects were released on pending further . The most significant arrests of core members occurred in September 2016, when 19-year-old American Buchta of Fallston, (online as "@fbiarelosers" and "pein"), was detained by U.S. authorities, and 19-year-old national Bradley Jan Willem van Rooy (online as "@UchihaLS") was taken into custody in the . Both faced federal charges in for conspiring to damage protected computers by operating Lizard Stresser and Stresser platforms—affiliated with Lizard Squad and PoodleCorp—which powered thousands of DDoS incidents, including against and entities. The uncovered their trafficking of approximately 3,470 stolen records and operation of ancillary services like phonebomber.net for campaigns. A U.S. federal court in authorized the seizure of four domains, including lizardsquad.org and stresser.poodlecorp.org, disrupting the services' online presence. Buchta's cooperation with the FBI following his arrest provided leading to additional detentions within Lizard Squad's network, highlighting internal fractures exploited by law enforcement.

Prosecutions and Sentences

In October 2016, the U.S. Department of Justice charged Zachary Buchta, a 19-year-old from , and Bradley Jan Willem Van Rooy, a 19-year-old from the , with conspiracy to cause damage to protected computers and unauthorized access to computers, stemming from their operation of DDoS-for-hire services under Lizard Squad and the related group PoodleCorp. The charges alleged that the pair maintained websites like lizardsquad.org and stresser.poodlecorp.org, which facilitated thousands of DDoS attacks worldwide for fees as low as $10 per attack. Buchta, identified as a founder of Lizard Squad, pleaded guilty in December 2017 after cooperating with the FBI, providing that aided in identifying and arresting other members. On March 27, 2018, Buchta was sentenced in the U.S. District Court for the Northern District of to three months in , followed by three years of supervised release, and ordered to pay $349,998 in restitution to victims of the attacks. The reduced sentence reflected his substantial assistance to authorities, including testimony against associates, despite facing up to 10 years initially. Van Rooy faced prosecution in the rather than , but no public details on his sentencing outcome have been disclosed in available records. Separately, in July 2015, authorities convicted Kivimäki, a 17-year-old member of Lizard Squad known online as "zeekill" or "jks," of 50,700 counts of aggravated computer break-ins related to DDoS attacks, including those targeting gaming networks. As a juvenile offender, Kivimäki received a with and , avoiding incarceration despite the scale of the offenses. Other investigations yielded arrests of individuals using Lizard Squad's "Lizard Stresser" tool, such as six teenagers in the UK in August 2015, who were released on pending further proceedings, though these were not core group members. No additional prosecutions of identified Lizard Squad leaders have resulted in public sentences beyond these cases.

Impact and Dissolution

Broader Effects on Cybersecurity

The Lizard Squad's distributed denial-of-service (DDoS) attacks on the and Xbox Live, peaking on December 25, 2014, disrupted online services for hours, affecting over 110 million PSN users and 48 million Xbox Live accounts, and exposed the fragility of high-traffic gaming infrastructures to coordinated volumetric assaults. These incidents, executed via rented booter services amplified by botnets, inflicted estimated multimillion-dollar losses in compensation—such as five-day subscription extensions and discounts from and —and compelled platforms to procure enterprise-grade DDoS scrubbing services for real-time traffic filtering. By commercializing DDoS capabilities through tools like LizardStresser, which leveraged thousands of compromised consumer routers to generate attack traffic, the group lowered for aspiring attackers, enabling a proliferation of similar services that fueled thousands of incidents in and beyond from onward. Honeypot research deployed in early captured over 1.5 million probe attempts, with more than 96% originating from centralized booter sources rather than organic botnets, quantifying how such platforms threat volumes and shifted attack methodologies toward reflection-based . These events catalyzed enforcement actions, including U.S. indictments in October 2016 against Lizard Squad affiliates for operating resold booter like PoodleStresser, and prompted underground forums such as HackForums to restrict advertisements for attack services by late 2016. Industry-wide, the attacks underscored device vulnerabilities in formation, driving investments in upstream filtering by ISPs and heightened scrutiny of reflection protocols, while informing later multinational takedowns of over two dozen booters ahead of seasonal threats.

Legacy in Hacker Culture

Lizard Squad's activities were largely derided within hacker communities as emblematic of "" behavior, characterized by the use of readily available DDoS tools and botnets sourced from compromised home routers rather than developing novel exploits or demonstrating deep technical prowess. Cybersecurity experts and discussions emphasized that the group's disruptions, such as the December 25, 2014, attacks on Xbox Live and , relied on rented or controlled stresser services rather than bespoke or zero-day vulnerabilities, positioning them as opportunistic disruptors rather than elite blackhat operatives. The group's commercialization of DDoS capabilities through LizardStresser, a for-hire launched in late that powered attacks via thousands of hijacked consumer devices, significantly lowered for low-skill actors in underground scenes. This model amplified the proliferation of booter services, enabling "stunt hacking" for publicity or and shifting focus from intricate intrusions to volume-based denial-of-service tactics, a trend that persisted in subsequent groups mimicking their operational style. In broader hacker lore, 's bombastic Twitter announcements and self-proclaimed title as "King of DDoS attacks" fostered a of performative malice, inspiring holiday-season disruptions and highlighting the appeal of notoriety over or . Their 2014 exploits, which affected millions of users during peak periods, underscored vulnerabilities in consumer-facing while serving as a cautionary for the risks of adolescent bravado in digital sabotage, often cited in discussions of evolving threat actors from lone wolves to loosely affiliated crews.

References

  1. [1]
    American and Dutch Teenagers Arrested on Criminal Charges for ...
    Oct 5, 2016 · The charges are the result of an international investigation into the computer hacking groups “Lizard Squad” and “PoodleCorp,” according to ...
  2. [2]
    Possible Hack Of Sony, Microsoft Game Console Sites - NPR
    Dec 26, 2014 · A group calling itself Lizard Squad has claimed responsibility for a possible denial-of-service attack against the tech companies' online ...
  3. [3]
    Lizard Squad hijacks Malaysia Airline DNS - IT Security Guru
    Jan 26, 2015 · Hackers purporting to be from the “Lizard Squad – Official Cyber Caliphate” group have attacked the official website of Malaysia Airlines, ...<|separator|>
  4. [4]
    'Lizard Squad' hacker pleads guilty to 23 cyber crimes - WIRED
    May 22, 2015 · A teenage member of hacker group Lizard Squad has pleaded guilty to numerous charges brought against him, including swatting, extortion, ...
  5. [5]
    No jail for Lizard Squad member guilty of 50700 cybercrime charges
    Jul 8, 2015 · A 17-year-old member of notorious hacking gang Lizard Squad has escaped jail time, despite being convicted of 50,700 computer crime charges.<|control11|><|separator|>
  6. [6]
    Lizard Squad member pleads guilty over 23 counts related to 'swatting'
    May 22, 2015 · Lizard Squad member pleads guilty over 23 counts related to 'swatting' ... A Canadian teen has plead guilty to more than 23 counts related to a ...
  7. [7]
    Lizard Squad member jailed after offering DDoS-for-hire attack service
    Mar 29, 2018 · Lizard Squad member jailed after offering DDoS-for-hire attack service ... Before sentencing, Buchta read a statement to the court apologising ...
  8. [8]
    Feds Charge Two In Lizard Squad Investigation - Krebs on Security
    Oct 6, 2016 · The US Justice Department has charged two 19-year-old men alleged to be core members of the hacking groups Lizard Squad and PoodleCorp.
  9. [9]
    Lizard Squad and PoodleCorp Hacker Pleads Guilty to DDoS Attacks
    Dec 22, 2017 · A member of the infamous Lizard Squad and PoodleCorp hacking groups pleaded guilty this week to charges of running a DDoS-for-hire platform.
  10. [10]
    How Teenage Hackers Hijack the Internet - RUSI
    Tracking the rise and fall of groups such as LulzSec, HTP, UG Nazi, and Lizard Squad, Ctrl+Alt+Chaos features exclusive interviews with the hackers as well ...
  11. [11]
    Julius 'zeekill' Kivimäki, former Lizard Squad hacker, arrested in ...
    who as a teenager in 2015 was convicted on over 50,000 counts of computer crimes — has ...
  12. [12]
    Lizard Squad: Who Is the Group Claiming Responsibility for High ...
    Aug 26, 2014 · The hacker group Lizard Squad is apparently responsible for several recent high profile hacks. @LizardSquad/Twitter. &#151; -- Catch them if ...Missing: origins | Show results with:origins
  13. [13]
    PlayStation Network attacked by hacker group – Xbox may be next ...
    Lizard Squad (@LizardSquad) August 24, 2014. Later on Sunday, another hacker named “Fame” also claimed responsibility for ...Missing: creation | Show results with:creation
  14. [14]
  15. [15]
    DDoS Attacks, Bomb Threats & ISIS - Who Is The Lizard Squad?
    Aug 27, 2014 · So far the group has made countless references to lizards, told people to write "Lizard Squad" on their forehead and has gone after multiple ...
  16. [16]
    PlayStation Network back online, while Lizard hacker group basks in ...
    Dec 29, 2014 · Formed in mid-2013, Lizard Squad has been stepping up its media profile in the wake of the Christmas attacks. In a series of interviews, two ...
  17. [17]
    What will happen to the Lizard Squad hackers? - The Guardian
    Feb 20, 2015 · Among those who follow hacker culture, the arrest had only been a matter of time. Those observers see it as inevitable that Lizard Squad will ...<|separator|>
  18. [18]
    Lizard Stresser Runs on Hacked Home Routers - Krebs on Security
    Jan 9, 2015 · Lizard Stresser Runs on Hacked Home Routers ... The online attack service launched late last year by the same criminals who knocked Sony and ...
  19. [19]
    Blizzard DDoS by Lizard Squad - Radware
    Apr 14, 2016 · Following a series of threats issued via Tweeter, Lizard Squad used their powerful stressers to take down the servers of Blizzard's online ...
  20. [20]
    Lizard Squad: Two Bot Thugs - Recorded Future
    Lizard Squad has been in the news for the past month as a rapidly evolving story since their Christmas day distributed denial of service (DDoS) attacks ...
  21. [21]
    XBox and PSN attacks were just an advert for hackers' DDoS service
    Dec 31, 2014 · The Lizard Squad gang has now launched a new service, LizardStresser, through which anyone can launch a distributed denial-of-service (DDoS) attack.
  22. [22]
    Lizard Squad's DDoS service hacked, buyers' details revealed
    Jan 19, 2015 · Security blogger Brian Krebs reports that Lizard Squad's own DDoS-for-hire website – Lizardstresser.su – has been compromised. The site is ...
  23. [23]
    Lizard Squad Offers $6 DDoS Attack Tool | PCMag
    Dec 31, 2014 · Meanwhile, the Lizard Squad said it also played a role in the Sony Pictures Entertainment hack.
  24. [24]
    Take down any website for $3 | FOX 4 Kansas City WDAF-TV
    Dec 31, 2014 · Cloudflare, a major provider of denial of service protection, masks websites' IP addresses to prevent them from being attacked. Lizard Stresser ...
  25. [25]
    Lizard Squad's LizardStresser booter runs on 'hacked home routers'
    Jan 12, 2015 · Security expert Brian Krebs warns that internet users who didn't change their default passwords may be unknowingly aiding hacking group.
  26. [26]
    Lizard Squad now offering DDoS attack tool for as little as $6 per ...
    Dec 31, 2014 · After crashing Xbox Live and the PlayStation Network, Lizard Squad is making its DDoS tool available as a service, but totally just a stress ...<|control11|><|separator|>
  27. [27]
    Lizard Squad DDoS-for-hire service hacked - users' details revealed
    Jan 19, 2015 · Lizard Squad failed to encrypt its database of LizardStresser's registered users - storing details of their usernames and passwords in plaintext ...
  28. [28]
    Lizard Squad's LizardStresser hacked and customer details made ...
    Jan 19, 2015 · Lizard Squad's LizardStresser hacked and customer details made public ... Hacking group Lizard Squad made a name for itself with high-profile ...Missing: August | Show results with:August
  29. [29]
    Xbox Live Destroyers Lizard Squad Facing Backlash In ... - Forbes
    Jan 20, 2015 · A denizen of the darkweb, former Doxbin controller nachash, tells Forbes why he leaked the database of Lizard Squad attack service Lizard ...
  30. [30]
    Lizard Squad's paid cyberattack service faces a hack of its own
    Jan 17, 2015 · Lizard Squad is apparently getting a taste of its own medicine. Security guru Brian Krebs has learned that someone hacked Lizard Stresser, ...
  31. [31]
    Xbox live and Playstation attack: Christmas ruined for millions of ...
    Dec 26, 2014 · The motive for the attack is not clear, but Lizard Squad had apparently threatened to target both networks at Christmas, using a now deleted ...
  32. [32]
    Worst over? Hackers claim responsibility for gamers' offline misery
    Dec 26, 2014 · At 6:13 p.m. Friday, a Lizard Squad twitter handle tweeted, “ALL ATTACKS ON PSN AND XBOX HAVE STOPPED.” When a CNN reporter hit refresh ...
  33. [33]
    Xbox and PlayStation resuming service after attack - BBC News
    Dec 27, 2014 · A hacker claiming to be from Lizard Squad - a 22-year-old calling himself Member Two - said it had hacked the sites "because we can". He also ...
  34. [34]
    Cowards Attack Sony PlayStation, Microsoft xBox Networks
    chat.lizardpatrol.com — suggest that these ...
  35. [35]
    Who's in the Lizard Squad? - Krebs on Security
    Dec 29, 2014 · Kim Dotcom offers Lizard Squad members vouchers to stop the attack. The LizardSquad reportedly only called off their attacks after MegaUpload ...<|control11|><|separator|>
  36. [36]
    Lizard Squad vs Anonymous — 'PlayStation, Xbox and Tor Network ...
    Dec 27, 2014 · It was the notorious hacker group "Lizard Squad" who claimed the responsibility for taking down PlayStation Network, saying it has made unavailable both ...
  37. [37]
    Malaysia Airlines website 'compromised' by hackers - BBC News
    Jan 26, 2015 · Hackers claiming to be from the "Lizard Squad - Official Cyber Caliphate" group have attacked the official website of Malaysia Airlines.
  38. [38]
    Malaysia Airlines website hacked by 'Lizard Squad' - The Guardian
    Jan 26, 2015 · The Malaysia Airlines website was commandeered on Monday by hackers who referenced the Islamic State jihadists and claimed to be from the “Lizard Squad”.
  39. [39]
    Malaysia Airlines Hit by Lizard Squad Hack Attack - ABC News
    Jan 26, 2015 · The hacker group Lizard Squad has claimed responsibility for attacking Malaysia Airlines' website on Sunday.
  40. [40]
    Lizard Squad is back: group 'attacks Xbox Live and Daybreak Games'
    Feb 16, 2015 · Notorious hacking group Lizard Squad has reportedly launched a fresh series of attacks against games and game services this weekend, including Xbox Live.Missing: origins | Show results with:origins
  41. [41]
    Lizard Squad returns, claims attack on Xbox Live and Daybreak ...
    Feb 17, 2015 · Hacking group Lizard Squad returned over the weekend with alleged fresh attacks against Microsoft's Xbox Live service and the studio formerly known as Sony ...
  42. [42]
    Bomb Threat Tweets Cause AA Plane To Be Diverted - CBS News
    Aug 24, 2014 · ... threat. A hacker group called Lizard Squad tweeted "We've been receiving reports that flight 362 from DFW to San Diego has explosives on board.Missing: hoax | Show results with:hoax
  43. [43]
    Sony executive's flight cut short by Twitter threat; network attacked
    Aug 25, 2014 · ... Lizard Squad that claimed explosives had been planted on the plane. Advertisement. ”.@AmericanAir We have been receiving reports that ...Missing: hoax | Show results with:hoax
  44. [44]
    Teen pleads guilty to 23 charges of swatting, harassing online game ...
    May 21, 2015 · Lizard Squad member's spree ended days after an eight-hour swatting broadcast.
  45. [45]
    Who are Lizard Squad and what's next for the hackers? - BBC News
    Jan 27, 2015 · Facebook has denied it was hacked and that access issues earlier were "not the result of a third party attack". A hacker group called Lizard ...
  46. [46]
    Facebook DOWN. Instagram OFFLINE. Lizard Squad: “HELLO”
    Jan 27, 2015 · Reptilian hackers Lizard Squad's claim denied by Facebook: Facebook was down for an hour. Instagram was down, too.
  47. [47]
    Facebook And Instagram Outage Was Global - Techtrends Zambia
    Jan 27, 2015 · The infamous hackers group Lizard Squad claimed to have hacked the sites, a claim denied by a Facebook spokesman who said, “Earlier today ...
  48. [48]
    17-Year-Old Lizard Squad Member Found Guilty ... - The Hacker News
    Jul 8, 2015 · Lizard-Squad-hacking · The infamous computer hacker gang Lizard Squad launched massive Distributed Denial-of-Service (DDoS) attacks against the ...Missing: August | Show results with:August
  49. [49]
    Lizard Squad's '@fbiarelosers' hacker gets smaller sentence for ...
    Mar 29, 2018 · Lizard Squad hackers face cybercrime charges in Chicago. Two teenagers allegedly connected to an infamous hacking group known as Lizard Squad ...
  50. [50]
    Meet Lizard Squad, the group that may have helped North Korea ...
    Dec 23, 2014 · An amorphous hacker collective known as Lizard Squad may have played a role in the massive cyberattack against Sony, according to the cybersecurity firm ...
  51. [51]
    Lizard Squad claim attack on Lenovo days after Superfish
    Feb 26, 2015 · Both people have been connected to the former hacking group Hack The Planet, according to Krebs, an outfit that Lizard Squad member Julius ...
  52. [52]
    FCC Fines Cox $595K Over Lizard Squad Hack - Krebs on Security
    Nov 6, 2015 · This week, the Federal Communications Commission (FCC) fined Cox $595,000 for the incident that affected me and 60 other customers. coxletter I ...Missing: hoaxes | Show results with:hoaxes
  53. [53]
    Finnish teen convicted of more than 50,000 computer hacks - BBC
    Jul 8, 2015 · A teenager involved in series of high profile cyber attacks has been convicted for his crimes in Finland. Julius Kivimaki was found guilty ...
  54. [54]
    LizardStresser: Six people arrested for using Lizard Squad's DDoS ...
    Aug 28, 2015 · LizardStresser: Six people arrested in connection with Lizard Squad's DDoS attack tool. British police have today announced the arrest of six ...
  55. [55]
    'Lizard Squad' hacker-for-hire cries in court as he's sentenced to ...
    Mar 28, 2018 · Buchta was just 17 when he came under FBI scrutiny as a founding member of the prolific hacker groups Lizard Squad and PoodleCorp, which charged ...Missing: outcomes | Show results with:outcomes
  56. [56]
    'Lizard Squad' Hacker Admits To Conspiracy Targeting 'Thousands'
    Dec 20, 2017 · The feds charged Buchta along with Bradley Jan Willem Van Rooy of the Netherlands in October 2016. Van Rooy is being prosecuted overseas. Lizard ...
  57. [57]
    Six bailed teenagers accused of cyber attacks using Lizard Squad tool
    Aug 28, 2015 · Six teenagers have been released on bail on suspicion of using hacking group Lizard Squad's cyberattack tool to target websites and services.Missing: investigations | Show results with:investigations
  58. [58]
    What Really Happened in the Aftermath of the Lizard Squad Hacks
    Jun 5, 2025 · It was all over social media: A group of hackers called Lizard Squad were bragging about their massive DDoS attack on Xbox Live and ...Missing: origins | Show results with:origins
  59. [59]
    How Christmas became one of the biggest days of the year for hackers
    Dec 24, 2019 · Prosecutors said his attacks included the first high-profile Christmas DDoS attack against gaming companies in late 2013. After the Lizard ...
  60. [60]
    Are the Days of “Booter” Services Numbered? - Krebs on Security
    Oct 27, 2016 · In some ways this has already happened, as I detailed in my January 2015 story, Lizard Stresser Runs on Hacked Home Routers. But with the now ...
  61. [61]
    Lizard Squad hackers face cybercrime charges in Chicago
    Oct 7, 2016 · Two teenagers allegedly connected to an infamous hacking group known as Lizard Squad have been charged with operating cyber-attack-for-hire websites.Missing: court cases
  62. [62]
    Lizard Kids: A Long Trail of Fail - Krebs on Security
    Dec 31, 2014 · The Lizard Squad, a band of young hooligans that recently became ... They're not hackers really, they're script-kiddies. The day ...
  63. [63]
    Lizard Squad and the DDoS-for-hire ecology explained by ...
    Jan 13, 2015 · The attacks started with Lizard Squad hitting major gaming networks including Battle.net (home of World of Warcraft, Starcraft II, and Diablo), ...
  64. [64]
    DDoS-for-Hire Threat Landscape Continues to Grow - Radware
    Aug 26, 2020 · ... services. In the past, groups like Lizard Squad would engage in "stunt hacking." This involved launching largescale DDoS attacks and using ...Missing: influence | Show results with:influence