Feeds

Anti-piracy lawyers' email database leaked after hack

Backup torrented

Secure remote control for conventional and virtual desktops

Hackers have uploaded a leaked database of emails from anti-piracy law firm ACS:Law onto P2P networks and websites.

ACS:Law was among a handful of entertainment industry-affiliated organisations to endure denial of service attacks by the denizens of 4Chan last week. A loose-knit collective of members of the notorious message board also hit the MPAA, RIAA and BPI using online attack tools, taking the MPAA and RIAA offline in the process.

Other targets of Operation: Payback is a bitch included solicitors ACS:Law and Davenport Lyons. During attempts to re-establish ACS:Law's website it seems a compressed copy of what seems to be at least part of the firm's email database, contained in site backups, was exposed online. Hackers extracted this webmail file and made it available via torrent trackers and posted it on a limited number of websites over the weekend.

“Their site came back online [after the DDoS attack] – and on their front page was accidentally a backup file of the whole website (default directory listing, their site was empty), including emails and passwords,” a leader of the attacking group told TorrentFreak.

Information contained in the email database reportedly includes personal details of the targets of the law firm's threatening letters and business correspondence with ACS:Law's partners. These email nuggets are buried among spam and office admin exchanges in a 350MB file. Slyck reports that the file contains around a month of webmails belonging to solicitor Andrew Crossley, head of ACS:Law.

UK-based ACS:Law has enraged the more freewheeling sections of the internet by threatening lawsuits against alleged P2P copyright infringers unless they agree to an out-of-court settlement, typically of £500. The files involved are often video games or pornographic flicks, with copyrights held by German monitoring firm Digiprotect. ACS:Law is under investigation over its tactics by the Solicitor's Regulatory Authority, with a tribunal expected next year.

Privacy International said on Monday that it plans to sue ACS:Law for violating the privacy of internet users over the security breach. It reckons the names and personal details of targets of ACS:law's legal nastygrams could become the target of scams or identity theft as a result of the email leak. The privacy activists are also briefing the Information Commissioner's Office on the breach. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Mozilla, EFF, Cisco back free-as-in-FREE-BEER SSL cert authority
Let’s Encrypt to give HTTPS-everywhere a boost in 2015
Meet OneRNG: a fully-open entropy generator for a paranoid age
Kiwis to seek random investors for crowd-funded randomiser
USB coding anarchy: Consider all sticks licked
Thumb drive design ruled by almighty buck
Attack reveals 81 percent of Tor users but admins call for calm
Cisco Netflow a handy tool for cheapskate attackers
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Choosing a cloud hosting partner with confidence
Download Choosing a Cloud Hosting Provider with Confidence to learn more about cloud computing - the new opportunities and new security challenges.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.