The hacking group LulzSec has released more data from attacks on the servers of the US Senate and games developer Bethesda Softworks.
The group posted server data apparently from US Senate networks to show that it had broken at least some of the government's security systems.
The file names suggest that the data is from an archive server containing access logs, voting records and information on Senate members.
"We don't like the US government very much. Their boats are weak, their lulz are low, and their sites aren't very secure," said the group in a statement.
"In an attempt to help them fix their issues, we've decided to donate additional lulz in the form of owning them some more! This is a small, just-for-kicks release of some internal data from Senate.gov - is this an act of war, gentlemen? Problem?"
The group also released data from games developer Bethesda Softworks, which makes the popular first person shooter Brink and the Elder Scrolls series.
LulzSec said that it hacked into Bethesda two months ago, claiming that it is a fan of the company and wanted more information on its games.
"Some weeks ago, we smashed into Brink with our heavy artillery Lulz Cannons and decided to switch to ninja mode," LulzSec said.
"From our LFI entry point, we acquired command execution via local file inclusion of enemy fleet Apache vessel. We then found that the HTTPD had SSH auth keys, which let our ship SSH into other servers."
Some of Bethesda's corporate information was released, but the 200,000 user accounts for Brink were not released since the company makes good games, LulzSec explained.
Bethesda acknowledged that an attack had taken place and that user names, email addresses or passwords may have been compromised, but not credit card or payment information.
"We regret any inconvenience that these attacks on us cause you," the firm said in a statement. "These attacks will be evaluated to determine if there are any additional protections we might take that would be prudent."
LulzSec also released user account information last weekend gleaned from the servers of pornography web sites, including Pron.com.
The group published over 26,000 registered user email addresses and passwords, and said that it had already identified five government or military users, including one fighter pilot and someone with a White House account.
LulzSec has quickly become one of the most prominent hacking groups in operation. It first surfaced last month with an attack on PBS, and has since carried out attacks on Sony, the FBI, Nintendo and the NHS.
"LulzSec is committing crimes for the fun of it," said Mikko Hyppönen, chief security officer at F-Secure, in a Twitter post.
Kicking Palantir off of AWS is among their demands, too
Rafaela Vasquez was watching The Voice at the time of the crash, new evidence shows
PUBG price slashed on Steam after selling more than 50 million copies - as daily player numbers plunge
Use the same password for every website? It might be time to change them all