Feeds

ACS:Law's mocking of 4chan could cost it £500k

Doin' it for the lulz

Providing a secure and efficient Helpdesk

Off-the-cuff bravado aimed at internet pranksters has led to what must already rank as one of the worst ever data leaks, by the anti-filesharing solicitors ACS:Law.

The personal details of thousands of ISP customers accused of unlawfully sharing pornography, as well as video games, are now freely available online. The sensitivity of such data makes the leak a particularly serious matter under the Data Protection Act.

Meanwhile the law firm is faced with the threat of a fine by the Information Commissioner, Christopher Graham, who is keen to use new powers that raise the maximum penalty to £500,000.

The events of the past few days may come to mean that ACS:Law boss Andrew Crossley's comments in a brief phone conversation last Wednesday are remembered as some of the most ill-advised in internet history.

ACS:Law at that time was, along with several other rights holder-related websites, already the subject of a DDoS attack by 4chan members under the auspices of "Operation: Payback is a Bitch".

However when The Register caught Crossley on his mobile, he singled out ACS:Law for extra punishment.

"It was only down for a few hours. I have far more concern over the fact of my train turning up 10 minutes late or having to queue for a coffee than them wasting my time with this sort of rubbish," he said.

Posts on 4chan show this was all the encouragement members needed to redouble the attack.

According to several people involved, the records now available on filesharing networks were exposed in directories on the ACS:Law website front page, apparently as part of blundering efforts to bring it back online. While individuals whose alleged pornography downloading has been published to the world, along with their home addresses, may not thank 4chan, there was no "hack" involved.

"The question we will be asking is how secure was this information and how it was so easily accessed from outside," said Christopher Graham this morning.

"We'll be asking about the adequacy of encryption, the firewall, the training of staff and why that information was so public facing," he added.

There are plenty of other concerning aspects to the story. Though they were compelled to hand over customer details to ACS:Law by court orders, emails show that BT, for example, disclosed data via unencrypted Excel spreadsheet attachements.

The first lesson is already obvious, however: don't mess with 4chan. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.