Attacks/Breaches
1/20/2012
09:42 AM
Connect Directly
RSS
E-Mail
50%
50%

Anonymous Retaliates For Megaupload Raids: 10 Key Facts

Hacktivists launch DDoS attacks on FBI, Justice Department, music and movie producers, in part using disguised links that trick people into assisting the assault.

The Department of Justice takedown Thursday of Megaupload and sister site Megavideo triggered a rapid retaliation from the hacktivist group known as Anonymous, which proceeded to knock the DOJ's website offline.

The tussle came in response to the Justice Department's 72-page indictment, unsealed Thursday in Virginia, which charged seven executives of Megaupload, which is based in Hong Kong, with copyright infringement and operating a criminal enterprise. According to the indictment, Megaupload generated $175 million in subscription and advertising revenue, while costing copyright holders $500 million in lost revenue.

Accompanying international raids saw 20 search warrants served in nine countries, including the United States, and $50 million in assets seized. Meanwhile, three of the accused, including 37-year old Kim Dotcom--a citizen of both Finland and Germany who also goes by the name Kim Tim Jim Vestor, and whose real name is Kim Schmitz--were arrested in Auckland, New Zealand. Four other people named in the indictment, however, remain at large.

[ Is piracy more of an IT problem or a business problem? Learn why Piracy Equals Market Failure. ]

Here's where the Megaupload story stands now:

1. Raids inflame political debate. The timing of the FBI's raid against one of the Internet's most popular file-locker sites was sure to serve as a flashpoint for many people who just one day previously had joined in what was billed as the largest online protest in history. Notably, they were demonstrating against proposed anti-piracy legislation--the House's Stop Online Piracy Act (SOPA) and the Senate's PROTECT IP Act (PIPA)--which is backed by copyright enforcers but derided by others as being a threat to free speech, as well as the stability of the Internet.

2. Anonymous responds with massive DDoS attack. The DOJ raids led Anonymous to launch Thursday what it said was the largest distributed denial-of-service (DDoS) attack in history, which took down the websites of the Department of Justice, FBI, Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and Universal Music Group. Anonymous said 5,635 people had participated by using its low orbit ion cannon tool for flooding websites with fake packets, thus triggering a DDoS. It promised more "Operation MegaUpload" attacks would follow.

3. DOJ questions Anonymous assertions. A post to the AnonOps Twitter channel--a reliable source of Anonymous-related activities--late Thursday read: "One thing is certain: EXPECT US! #Megaupload." In response to the DOJ website outage which then occurred, however, an agency spokeswoman told CNN, "We are having website problems, but we're not sure what it's from." But just one hour after threatening the takedown, AnonOps announced: "justice.gov & universalmusic.com TANGO DOWN! You should have EXPECT US! #Megaupload."

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SuperMario007
50%
50%
SuperMario007,
User Rank: Apprentice
1/29/2012 | 4:44:58 AM
re: Anonymous Retaliates For Megaupload Raids: 10 Key Facts
"According to the indictment, Megaupload generated $175 million in subscription and advertising revenue,"

The Feds are so smart broadcasting how profitable this enterprise was will really deter others from starting similar sites. NOT!
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.