Attacks/Breaches
1/20/2012
09:42 AM
50%
50%

Anonymous Retaliates For Megaupload Raids: 10 Key Facts

Hacktivists launch DDoS attacks on FBI, Justice Department, music and movie producers, in part using disguised links that trick people into assisting the assault.

4. Anonymous links launch auto-attacks. Unlike past attacks, with "OpMegaUpload" Anonymous appears to have not just relied on willing volunteers. "This time, things are slightly different: you only have to click on a Web link to launch a DDoS attack," said Graham Cluley, senior technology consultant at Sophos, in a blog post. He said many of these links--which point to pastehtml.com--had been circulating in disguised form via Twitter, and warned that clicking on said links would execute a DDoS attack (which are illegal), unless JavaScript was disabled in the browser.

5. Megaupload was mega-popular. The Justice Department, in its indictment, claimed that traffic to Megaupload and its sister sites--50 million visitors daily, on average--accounted for 4% of all Internet traffic. Statistics from Google AdSense, meanwhile, put the average number of daily visitors to Megaupload, over the past year, at about 6 million, and said the site's traffic accounted for about 1.4% of all Internet traffic. By either measure, then, Megaupload was one of the most popular sites on the Internet.

6. Indictment hinged on Virginia servers. Given the push by the RIAA and MPAA for SOPA and PIPA to target rogue foreign websites hosting pirated content, does the DOJ's indictment signal that such legislation isn't necessary? In fact, the DOJ was able to claim jurisdiction only because some of Megaupload's servers were based in Virginia.

7. Copyright enforcers signal elation. The RIAA Thursday issued a statement saying the indictment--and the alleged charges--demonstrated "a sinister scheme to generate massive profits through the distribution of the stolen intellectual property of others." The RIAA labeled the related raids as "a historic blow against one of the most notorious illegal distribution hubs in the world," and plugged SOPA and PIPA as a way to continue the press, saying that "if this service were hosted and operated, for example, in a foreign country, our government would be essentially powerless to do anything about it."

8. Executives dismiss allegations. After the federal indictment was unsealed, however, a lawyer for Megaupload characterized the action as "a civil case in disguise," and said the company would "vigorously" defend itself, reported the Guardian.

9. Feds captured conversations. But Megaupload's defense could be complicated by the federal indictment, which cites emails in which executives reported searching their own service for copies of Sopranos episodes. Meanwhile, two joked that "we have a funny business ... modern days pirates :)" in a chat transcript quoted in the indictment.

10. Filesharing remains highly politicized. Megaupload was a self-described "online storage and file delivery service," more commonly labeled as a "media file locker" by users. Critics, on the other hand, often derided it as an "illegal distribution hub." A decade after the death of Napster, that variation in language highlights the political debate that continues to underpin not just the Megaupload story, but broader questions of copyright protection and Internet freedom.

More than 700 IT pros gave us an earful on database licensing, performance, NoSQL, and more. That story and more--including a look at transitioning to Win 8--in the new all-digital Database Discontent issue of InformationWeek. (Free registration required.)

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
SuperMario007
50%
50%
SuperMario007,
User Rank: Apprentice
1/29/2012 | 4:44:58 AM
re: Anonymous Retaliates For Megaupload Raids: 10 Key Facts
"According to the indictment, Megaupload generated $175 million in subscription and advertising revenue,"

The Feds are so smart broadcasting how profitable this enterprise was will really deter others from starting similar sites. NOT!
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Latest Comment: nice one good
Current Issue
E-Commerce Security: What Every Enterprise Needs to Know
The mainstream use of EMV smartcards in the US has experts predicting an increase in online fraud. Organizations will need to look at new tools and processes for building better breach detection and response capabilities.
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Join Dark Reading community editor Marilyn Cohodas in a thought-provoking discussion about the evolving role of the CISO.