Feeds

Anti-piracy lawyers' email database leaked after hack

Backup torrented

The Power of One eBook: Top reasons to choose HP BladeSystem

Hackers have uploaded a leaked database of emails from anti-piracy law firm ACS:Law onto P2P networks and websites.

ACS:Law was among a handful of entertainment industry-affiliated organisations to endure denial of service attacks by the denizens of 4Chan last week. A loose-knit collective of members of the notorious message board also hit the MPAA, RIAA and BPI using online attack tools, taking the MPAA and RIAA offline in the process.

Other targets of Operation: Payback is a bitch included solicitors ACS:Law and Davenport Lyons. During attempts to re-establish ACS:Law's website it seems a compressed copy of what seems to be at least part of the firm's email database, contained in site backups, was exposed online. Hackers extracted this webmail file and made it available via torrent trackers and posted it on a limited number of websites over the weekend.

“Their site came back online [after the DDoS attack] – and on their front page was accidentally a backup file of the whole website (default directory listing, their site was empty), including emails and passwords,” a leader of the attacking group told TorrentFreak.

Information contained in the email database reportedly includes personal details of the targets of the law firm's threatening letters and business correspondence with ACS:Law's partners. These email nuggets are buried among spam and office admin exchanges in a 350MB file. Slyck reports that the file contains around a month of webmails belonging to solicitor Andrew Crossley, head of ACS:Law.

UK-based ACS:Law has enraged the more freewheeling sections of the internet by threatening lawsuits against alleged P2P copyright infringers unless they agree to an out-of-court settlement, typically of £500. The files involved are often video games or pornographic flicks, with copyrights held by German monitoring firm Digiprotect. ACS:Law is under investigation over its tactics by the Solicitor's Regulatory Authority, with a tribunal expected next year.

Privacy International said on Monday that it plans to sue ACS:Law for violating the privacy of internet users over the security breach. It reckons the names and personal details of targets of ACS:law's legal nastygrams could become the target of scams or identity theft as a result of the email leak. The privacy activists are also briefing the Information Commissioner's Office on the breach. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.