Anonymous and its spinoffs, including LulzSec, could be seriously damaged by the arrests of a half dozen high-level hackers.
"Anonymous," the hacker group, is no longer anonymous.
Six people alleged to be operating under the moniker of Anonymous, as well as "LulzSec" and "Internet Feds" – who had used their cyberskills to invade with seeming impunity computers belonging to law enforcement, government, and business – were arrested Tuesday.
Hector Xavier Monsegur, an unemployed computer programmer reportedly living on welfare in New York, was the ringleader operating under the name "Sabu," federal authorities say. He pleaded guilty to a dozen computer crimes including conspiracy. But the indictment handed down by the US Attorney of New York's southern district also said he cooperated with authorities to help round up other high-level hackers during a months-long investigation.
RECOMMENDED: Top 5 most expensive data breaches
Monsegur's journey from elite hacker to FBI informant began in 2008, when a loose confederation of computer hackers known as Anonymous were hacking into the websites and computer databases of companies and organizations they disliked, according to a statement by the Federal Bureau of Investigation's New York City office.
For example, between December 2010 and June 2011 Mr. Monsegur and other members of Anonymous were responsible for cyberattacks against the websites of Visa, MasterCard, and PayPal. The attacks were retaliation for those companies' refusal to process donations to WikiLeaks, the website that has drawn criticism for publishing secret government documents.
Sometime around the end of 2010, Monsegur was invited by another hacker – not named as a defendant – to join Internet Feds, a group of elite computer hackers affiliated with Anonymous, according to the indictment.
Monsegur was invaluable to the group as a "rooter," or someone who identifies vulnerabilities in the computer systems of potential victims in order to exploit those systems and gain access to them, the indictment said. He also provided "infrastructure support" – unauthorized access to computer servers and routers that others could use to launch cyberattacks.