Two alleged Lizard Squad members - Vinnie Omari and Ryan Cleary - were arrested earlier this week, with the latter's affiliation to the group and arrest also being acknowledged by the previously-used @LizardMafia handle on Twitter.
Supposed member 'ryan' is currently being held by Finnish authorities, and is still extremely rich from completely legal profits.-- R.I.U. Lizard Squad (@LizardMafia) December 31, 2014
Ryan Cleary, as tweeted by the 'The King Lizard' above, was arrested by Finnish authorities, while Vinnie Omari, according to the Daily Dot, was arrested by Thames Valley Police in the UK. The UK police unit has filed a press release announcing the arrest of an unnamed "22-year-old man from Twickenham on suspicion of fraud by false representation and Computer Misuse Act offences."
The Thames Valley Police statement goes on the detail the arrest was is in connection with an "ongoing investigation into cyber-fraud offences which took place between 2013 and August 2014 during which victims reported funds being stolen from their PayPal accounts" It adds the man was released on bail until March 10.
(Also see: Kim Dotcom Strikes Deal With Lizard Squad to Leave PSN, Xbox Live Alone)
The Daily Dot and noted security researcher Brian Krebs also claim to have obtained copies of the search and enter warrant, and bail notice, respectively, for Omari. The search warrant indicates the police press release glossed over a few details, such the task force being authorised to search for evidence related to the "hacking of the PlayStation Network and Xbox Live systems over the Christmas period."
The search warrant is claimed to have been obtained by the Daily Dot from Omari himself, who in an email said, "They took everything. Xbox one, phones, laptops, computer USBs, etc." Omari added that no charges had been filed.
In the meanwhile, the Lizard Squad's paid DDoS tool - the Lizard Stresser - is down, according to a pinned tweet on the @LizardMafia handle.
Stresser is down while we switch servers-- R.I.U. Lizard Squad (@LizardMafia) December 31, 2014
Security researcher Eric Zhang (via Engadget) also claims the tool's code was stolen from a similar tool called Titanium Stresser, and that it could be exploited to reveal user names and ID numbers of those who used it.