Feeds

Anti-piracy lawyers' email database leaked after hack

Backup torrented

High performance access to file storage

Hackers have uploaded a leaked database of emails from anti-piracy law firm ACS:Law onto P2P networks and websites.

ACS:Law was among a handful of entertainment industry-affiliated organisations to endure denial of service attacks by the denizens of 4Chan last week. A loose-knit collective of members of the notorious message board also hit the MPAA, RIAA and BPI using online attack tools, taking the MPAA and RIAA offline in the process.

Other targets of Operation: Payback is a bitch included solicitors ACS:Law and Davenport Lyons. During attempts to re-establish ACS:Law's website it seems a compressed copy of what seems to be at least part of the firm's email database, contained in site backups, was exposed online. Hackers extracted this webmail file and made it available via torrent trackers and posted it on a limited number of websites over the weekend.

“Their site came back online [after the DDoS attack] – and on their front page was accidentally a backup file of the whole website (default directory listing, their site was empty), including emails and passwords,” a leader of the attacking group told TorrentFreak.

Information contained in the email database reportedly includes personal details of the targets of the law firm's threatening letters and business correspondence with ACS:Law's partners. These email nuggets are buried among spam and office admin exchanges in a 350MB file. Slyck reports that the file contains around a month of webmails belonging to solicitor Andrew Crossley, head of ACS:Law.

UK-based ACS:Law has enraged the more freewheeling sections of the internet by threatening lawsuits against alleged P2P copyright infringers unless they agree to an out-of-court settlement, typically of £500. The files involved are often video games or pornographic flicks, with copyrights held by German monitoring firm Digiprotect. ACS:Law is under investigation over its tactics by the Solicitor's Regulatory Authority, with a tribunal expected next year.

Privacy International said on Monday that it plans to sue ACS:Law for violating the privacy of internet users over the security breach. It reckons the names and personal details of targets of ACS:law's legal nastygrams could become the target of scams or identity theft as a result of the email leak. The privacy activists are also briefing the Information Commissioner's Office on the breach. ®

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.