Computer hacking group Lulz Security recently announced it will end its nearly two-month rampage on the Internet.
The announcement came after the hacking group often referred to as LulzSec spent 50 days leveling cyberattacks against the several corporations, government bodies and private citizens.
Among those hit by LulzSec's antics were the U.S. Senate, the British Serious Organised Crime Agency, the CIA, Sony and a number of others. One of the group's latest attacks occurred last week when it stole hundreds of private intelligence files and personal data from the Arizona Department of Public Safety.
During the last two months, LulzSec has never been shy about its activities, often bragging about its exploits through announcements released online. The reason for the mayhem, the hacking group said, was to bring back the "AntiSec movement" in hopes of starting a revolution to "stomp down our common oppressors and imbue ourselves with the power and freedom we deserve."
In a statement, LulzSec claimed it had always intended for its campaign to last only 50 days. However, others have suggested that the recent arrest of a supposed LulzSec member in the U.K., coupled with pressure from the FBI, may have led to the group's dismantling.
In an interview with the Association Press, one LulzSec member said the group was disbanding simply because it was getting bored. Furthermore, another member stated via Twitter that the man arrested in the U.K. was not a part of the group.
Regardless of LulzSec's reason for dissolving, the group did shine a light on the vulnerabilities of many organizations and the growing threat that cybercriminals pose. Though most experts agree that it is nearly impossible to guarantee data protection, the effects of data breaches can be mitigated through a number of measures, such as encryption and keeping up-to-date data security policies.