Soca website taken down after LulzSec 'DDoS attack'

Soca website The Soca website was taken offline by an apparent denial of service attack

Related Stories

The UK Serious Organised Crime agency has taken its website offline after it appeared to be a victim of an attack by hacking group Lulz Security.

Soca said it had taken its website offline to limit the impact attack on clients hosted by its service provider. had been unavailable for much of Monday afternoon, with an intermittent service restored later.

Lulz Security has said it was behind the denial of service attack which had taken the website offline.

Earlier on Monday, as the agency launched an investigation, LulzSec tweeted: "Tango down - in the name of #AntiSec".

The group has hit a number of high-profile websites in recent weeks, including the CIA and US Senate.

Soca appeared to be the victim of a distributed denial of service (DDoS) attack, where large numbers of computers, under malicious control, overload their target with web requests.

In a statement given to BBC News, a Soca spokesman said: "Soca has chosen to take its website offline to limit the impact of DDoS attack on other clients hosted by our service provider.

"The Soca website is a source of information for the general public which is hosted by an external provider. It is not linked to our operational material or the data we hold."


Earlier on Monday, a LulzSec Twitter posting seemed to confirm the nature of the attack.

"DDoS is of course our least powerful and most abundant ammunition. Government hacking is taking place right now behind the scenes," it said.

The latest attack will come as an embarrassment for Soca, which is tasked with investigating cybercrime.

"It is not going to please the boys in blue one bit," said Graham Cluley, senior technology consultant at security firm Sophos.

Lulz Security attacks

  • May 7: US X Factor contestant database
  • May 10: user passwords
  • May 15: Database listing locations of UK cash machines
  • May 23: Sonymusic Japan website
  • May 30: US broadcaster PBS. Staff logon information
  • June 2: user information
  • June 3: Infragard website (FBI affiliated organisation)
  • June 3:
  • June 10: pornographic website
  • June 13: - website of US Senate
  • June 13: Bethesda software website. User information
  • June 14: EVE Online, League of Legends, The Escapist and others

Mr Cluley added that it was wrong to confuse DDoS with the kind of hacking that can lead to confidential information being stolen.

However, he warned that LulzSec was capable of both types of attack.

"They have in the past broken into websites and stolen e-mail addresses and passwords, so there is a lot of harm can be done."

Big Lulz

When Lulz Security first appeared in May, the group portrayed itself as a light-hearted organisation, bent on creating online fun and Lulz (laughs).

Soon after, details of its hacking exploits began to emerge.

The first involved stealing and publishing a database of US X-Factor contestants, including their e-mail addresses and phone numbers.

It followed up with a mixture of website denial of service attacks and intrusions where data was taken and made available on the internet.

On June 19, LulzSec declared that it would begin targeting government systems, calling the campaign Antisec.

"Top priority is to steal and leak any classified government information, including e-mail spools and documentation. Prime targets are banks and other high-ranking establishments," said a post on the group's website.

The reason for LulzSec's greater focus on government is unclear, although it appears to have recently ended a feud with the more politically-motivated group Anonymous.

More on This Story

Related Stories

The BBC is not responsible for the content of external Internet sites

More Technology stories


Features & Analysis

Elsewhere on the BBC

  • KnucklesGood or bad?

    For many it can be very satisfying to 'crack' the bones in your hand, but is it bad for you?


  • BatteriesClick Watch

    More power to your phone - the lithium-ion batteries that could last twice as long

Try our new site and tell us what you think. Learn more
Take me there

Copyright © 2015 BBC. The BBC is not responsible for the content of external sites. Read more.

This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.