Jun 16, 2011 08:44 GMT  ·  By

The notorious hacking outfit LulzSec continues to taunt the U.S. government by attacking cia.gov days after it DDoSed the Senate's website.

As usual, there doesn't seem to be any specific reason for the attack except for the usual lulz. For those who are not familiar with Anonymous-related memes, "lulz" is the act of making fun at the expense of others.

"Tango down - cia.gov - for the lulz," LulzSec wrote on Twitter, returning later to add: "Lulz Security, where the entertainment is always at your expense, whether you realize it or not."

WikiLeaks announced the attack on its own Twitter feed, calling LulzSec its supporters and pointing out that the CIA has a special task force specifically targeting it.

"@WikiLeaks That we did. And that we do. <3," tweeted LulzSec, confirming that they indeed support WikiLeaks.

In fact, LulzSec is pretty open about its affiliation with WikiLeaks and Anonymous. In the past, it revealed that one of its members is @atopiary, a well known Anonymous and WikiLeaks supporter.

With this latest attack, LulzSec is trying to make a statement — that it isn't scared of being caught, not even by the US government which they're not very fond of.

In order to taunt the authorities, the hacker outfit has previously broken into the Atlanta chapter of InfraGard, an organization with close ties to the FBI, as well as the website of the US Senate.

"While some people think this is a fun game that can also help point out corporate security weaknesses, the truth is that companies and innocent customers are - in the worst cases - having their personal data exposed.

"There are responsible ways to inform a business that its website is insecure, or it has not properly protected its data - you don't have to put innocent people at risk," Graham Cluley, senior technology consultant at Sophos, says.

However, truth be told, LulzSec's attacks did reveal the poor state of security the Internet is in and the fact that companies dealing with personal data don't make enough efforts to protect it. This happens despite years and years of efforts from the security community to raise awareness about these vulnerabilities.