Hackers from Lulz Security release a massive data dump containing 62,000 passwords
In the latest cyberattack by the notorious hacking group Lulz Security, a text file containing the login credentials of 62,000 personal email accounts was made available for public download on Mediafire.
The text file, published by Lulz Security, includes numerous .gov accounts, including some from Illinois, US, Prince Edward Island, Canada, Kentucky, US, and four from Nasa. This breach not only exposes individuals to privacy risks but also raises concerns about cybersecurity practices within crucial government and defense roles.
The nature of the breach includes a comedic and provocative tone by Lulz Security, underscoring the risks when personal internet habits intersect with professional digital security. The involvement of government and military email accounts suggests cyber hygiene issues that extend beyond typical corporate targets.
Among the compromised accounts was a mail account containing tax exempts and personal information of an entire family, as demonstrated by Christian Olesen, a Danish blogger, at the LulzSec twitter account.
Lulz Security has stated that they do not know which sites the email accounts are from or how old they are. At the time of writing, the text file was available for download on Mediafire.
It's important to note that the release of these email login credentials exposes account holders to the risk of credit card theft, identity theft, social engineering, and extortion. Users have claimed to use the provided logins to access Facebook, PayPal, and Amazon accounts.
As of mid-2025, the latest update on the Lulz Security data breach reports that approximately 26,000 email addresses and passwords were leaked from various adult websites on June 10, 2025. Among the compromised accounts were email addresses linked to government and military institutions, highlighting serious cybersecurity vulnerabilities in sensitive sectors.
Other unrelated breaches, such as the TSTT telecommunications hack affecting over 800,000 customers, have occurred separately and involve different threat actors. No more recent or larger-scale Lulz Security breaches have been indicated in the available information.
In summary, the Lulz Security breach most recently publicized involved around 26,000 leaked email accounts from pornographic websites with some government and military emails affected, highlighting the ongoing risk to sensitive institutional email security. Users are advised to change their passwords and enable two-factor authentication on their accounts to minimize the risk of unauthorised access.
- The cyberattack by Lulz Security has highlighted the importance of maintaining strong cybersecurity in both personal and professional digital spaces, particularly within government and defense roles, where the release of sensitive information could have significant consequences.
- The latest update on the Lulz Security data breach reveals that around 26,000 email addresses and passwords were leaked from various adult websites, including those associated with government and military institutions, thereby emphasizing the ongoing threats to sensitive institutional email security and the need for improved cybersecurity practices.