starkmonster wrote:That credit card leak was fake, if you check the numbers on the cards they released the issuer ID (numbers two through six) were incorrect for ACLEDA, in fact if I remember correctly the issuer ID was different on each card meaning they were from many different banks. They probably downloaded them on Tor.
My thoughts go to LulzSec, they would release data retrieved from outsiders trying to prove their worth and be accepted into the group. Perhaps it's the same deal here but without verifying authenticity.
The primary reasons for why the feds were so successful in bringing LulzSec down were quite simple. They would seed torrents with stolen warez using their home connections and correlating the primary source is an easy task - you just need to get into the swarm faster enough to pinpoint the 100% seeders. Just to mention an example. After being tracked down then quickly turned on themselves (Sabu).
starkmonster wrote:These guys were amateur hour. They were getting everyone on Facebook to install a Firefox plugin which pinged the servers targeted by their "DDOS" attack. Also defacing a few government websites running Wordpress or Drupal that hasn't been updated in years is hardly an achievement.
That has always been the quality stamp for Anonymous cyber ops. They will recruit mindless drones because they are (mostly) too incompetent or lazy to build botnets.