After disbanding original LulzSec group, there is a sudden emerge of another defunt hacking group is under possession. The LulzSec Reborn has recently claimed the responsibility for leaking 10,000 twitter accounts on the internet.
They didn't hacked the twitter itself, but the flaw in the third party app has been an easy target to acomplish the event. The group leaked around 10,000 Twitter usernames and passwords of members who used Tweetgif, an animated Gif-sharing application.
The app requires users to login with their Twitter credentials to use the service and in-turn the website stores individuals username, passwords, bios, locations and secret tokens which has been now made public.
The group, which last month leaked account information from 171,000 members of the military via millitarysingles.com, has not given a reason for its latest hack. Reps from TweetGif could not be reached for comment at press time.
TweetGif lets users post and share animated Gif cliparts, but users have to log in through Twitter. It appears to be a relatively small application with less than 75,000 visitors globally, according to its Flag Counter stats, and only 690 followers of its Twitter account @TweetGif.
The emergence of LulzSec Reborn comes after police in the U.S., Great Britain and Ireland arrested five of the top LulzSec members in March.
However many security researchers, such as F-Secure's Sean Sullivan and Naked Security's Graham Cluley, have cast doubts that original LulzSec members are part of the "new" LulzSec. LulzSec Reborn has been pretty quiet since it launched, claiming only one major attack so far on Militarysingles.com, a dating site.