Reborn LulzSec Hacks Military Dating Site

Calling itself LulzSec Reborn, the group claimed Sunday on Twitter that it broke into, a site created to help soldiers find a match. The hackers posted on Pastebin public file-sharing sites containing information on almost 164,000 users, including names, usernames, e-mail addresses, IP addresses and passwords.

ESingles, the company that owns the dating site, denied Sunday that its site was hacked and said it was investigating the claim. "At this time there is no actual evidence that was hacked and it is possible that the Tweet from Operation Digiturk is simply a false claim," a person claiming to be a administrator said on the blog, which reported the hack. Anonymous announced the break-in under its Operation Digiturk Twitter moniker.

Neverthlesss, the administrator said the site was treating the claim as real and would "proceed with the required security steps in order to ensure the Web and its database is secure." ESingles was unavailable for comment Tuesday. reported Monday that's slideshow of members' pictures was unavailable. In their place was the message, "Error. Slideshow data cannot load due to security issue." On Tuesday, the site appeared to be running normally.

Sponsored post

On Monday, LulzSec Reborn claimed on Twitter that it had hacked the site of San Jose, Calif.-based CSS Corp., which provides IT services. The group claimed to have posted on Pastebin the company's e-mail database, including addresses, user names, passwords and user IDs. The company did not answer repeated telephone calls Tuesday.

The name LulzSec Reborn appears to be a reference to the suspension of activities of the original group after several of its co-founders were arrested and charged this month with computer hacking and other crimes. The FBI gathered evidence through a ringleader of the group, Hector Xavier Monsegur, 28, of New York, who had been an informant since last summer, according to a federal indictment.