Attacks/Breaches
1/20/2012
09:42 AM
50%
50%

Anonymous Retaliates For Megaupload Raids: 10 Key Facts

Hacktivists launch DDoS attacks on FBI, Justice Department, music and movie producers, in part using disguised links that trick people into assisting the assault.

4. Anonymous links launch auto-attacks. Unlike past attacks, with "OpMegaUpload" Anonymous appears to have not just relied on willing volunteers. "This time, things are slightly different: you only have to click on a Web link to launch a DDoS attack," said Graham Cluley, senior technology consultant at Sophos, in a blog post. He said many of these links--which point to pastehtml.com--had been circulating in disguised form via Twitter, and warned that clicking on said links would execute a DDoS attack (which are illegal), unless JavaScript was disabled in the browser.

5. Megaupload was mega-popular. The Justice Department, in its indictment, claimed that traffic to Megaupload and its sister sites--50 million visitors daily, on average--accounted for 4% of all Internet traffic. Statistics from Google AdSense, meanwhile, put the average number of daily visitors to Megaupload, over the past year, at about 6 million, and said the site's traffic accounted for about 1.4% of all Internet traffic. By either measure, then, Megaupload was one of the most popular sites on the Internet.

6. Indictment hinged on Virginia servers. Given the push by the RIAA and MPAA for SOPA and PIPA to target rogue foreign websites hosting pirated content, does the DOJ's indictment signal that such legislation isn't necessary? In fact, the DOJ was able to claim jurisdiction only because some of Megaupload's servers were based in Virginia.

7. Copyright enforcers signal elation. The RIAA Thursday issued a statement saying the indictment--and the alleged charges--demonstrated "a sinister scheme to generate massive profits through the distribution of the stolen intellectual property of others." The RIAA labeled the related raids as "a historic blow against one of the most notorious illegal distribution hubs in the world," and plugged SOPA and PIPA as a way to continue the press, saying that "if this service were hosted and operated, for example, in a foreign country, our government would be essentially powerless to do anything about it."

8. Executives dismiss allegations. After the federal indictment was unsealed, however, a lawyer for Megaupload characterized the action as "a civil case in disguise," and said the company would "vigorously" defend itself, reported the Guardian.

9. Feds captured conversations. But Megaupload's defense could be complicated by the federal indictment, which cites emails in which executives reported searching their own service for copies of Sopranos episodes. Meanwhile, two joked that "we have a funny business ... modern days pirates :)" in a chat transcript quoted in the indictment.

10. Filesharing remains highly politicized. Megaupload was a self-described "online storage and file delivery service," more commonly labeled as a "media file locker" by users. Critics, on the other hand, often derided it as an "illegal distribution hub." A decade after the death of Napster, that variation in language highlights the political debate that continues to underpin not just the Megaupload story, but broader questions of copyright protection and Internet freedom.

More than 700 IT pros gave us an earful on database licensing, performance, NoSQL, and more. That story and more--including a look at transitioning to Win 8--in the new all-digital Database Discontent issue of InformationWeek. (Free registration required.)

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SuperMario007
50%
50%
SuperMario007,
User Rank: Apprentice
1/29/2012 | 4:44:58 AM
re: Anonymous Retaliates For Megaupload Raids: 10 Key Facts
"According to the indictment, Megaupload generated $175 million in subscription and advertising revenue,"

The Feds are so smart broadcasting how profitable this enterprise was will really deter others from starting similar sites. NOT!
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9209
Published: 2015-03-30
Untrusted search path vulnerability in the Clean Utility application in Rockwell Automation FactoryTalk Services Platform before 2.71.00 and FactoryTalk View Studio 8.00.00 and earlier allows local users to gain privileges via a Trojan horse DLL in an unspecified directory.

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.