Lulz Security hacker group said Saturday that it has ended an internet rampage that included cyberattacks on videogame companies, police, and even a US spy agency website.
"For the past 50 days we've been disrupting and exposing corporations, governments, often the general population itself, and quite possibly everything in between, just because we could," the group said in a message uploaded to The Pirate Bay file sharing website.
"It is time to say bon voyage," the message concluded. "We must now sail into the distance."
The Lulz farewell contended that the group had a crew of six people and implied the plan from the outset was for the hacking campaign to last 50 days.
While it remained to be seen whether members of the group would truly stop bedeviling the internet, it was unlikely police would abandon efforts to track them down.
Lulz Security has claimed responsibility for hacking websites of the CIA, US Senate, Sony and others.
The group on Thursday released hundreds of documents from the Arizona Department of Public Safety in their latest cyberattack.
Lulz Security, or LulzSec, provided a link to the more than 700 documents on their website, LulzSecurity.com. The group said it was protesting Arizona's immigration laws.
The documents include information on drug cartels, street gangs, informants, border patrol operations and the names and addresses of members of the Arizona Highway Patrol.
Lulz Security said in a message at the time that it planned to release more classified police or military documents weekly.
"Behind the mask, behind the insanity and mayhem, we truly believe in the AntiSec (anti computer security) movement," Lulz Security said.
A British teenager suspected of involvement with the Lulz Security hacking spree has been remanded in police custody in London.
Ryan Cleary, 19, was arrested on Monday at his home in Wickford, southeast England, as part of a probe by Scotland Yard and the US Federal Bureau of Investigation (FBI) into Lulz Security.
British police on Wednesday charged Cleary with targeting the website of Britain's Serious Organized Crime Agency - the British equivalent of the FBI - with a Distributed Denial of Service (DDoS) attack.
DDoS attacks overwhelm websites with requests, causing them to be slow or inaccessible.
Lulz Security has staged a number of DDoS attacks on websites, including that of the CIA, but the group has also carried out a number of large-scale data thefts.