Feeds

Notorious Anonymous hacktivists launch fresh attacks

Latest counter-offensive after TorrentReactor and other TT sites attacked

Build a business case: developing custom apps

Hacktivists from the loosely-banded Anonymous took out the UK Intellectual Property Office and a Portuguese music industry website over the weekend during the latest phase of an ongoing campaign against the entertainment industry.

The ipo.gov.uk and acapor.pt were both rendered inaccessible by floods of spurious traffic in the latest phase of Operation: Payback is a bitch. The campaign is a response by activists to attempts by the entertainment industry to attack file-sharing and torrent tracker sites.

The campaign was sparked off by outrage over the appointment of a tech firm hired gun in India by the Bollywood entertainment industry. Aiplex Software said it was prepared to launch DDoS attacks at Torrent tracker sites that ignored its legal nastygrams.

Cue outrage on 4chan and the launch of reprisal attacks, which have previously affected the MPAA, RIAA and (most notoriously) law firm ACS:Law. The UK-based solicitors' email database was exposed during ham-fisted attempts to restore the site following a secondary denial of service attack partially provoked by ACS:Law's dismissive response to the first wave of attacks.

Panda Security has maintained a detailed scorecard showing the targets of attack, and the resulting site downtimes, in a blog post here.

Sources suggest that the ipo.gov.uk tried pointing its DNS records towards known anonymous servers. However, this attempt to reflect the attack failed to do much good and the IPO's site remained inaccessible on Monday morning.

Meanwhile, in possibly related news, a hack attack on hosting provider Reality Check Network (RCN) took out several Torrent tracker sites over the weekend. TorrentReactor and other torrent tracker sites were taken offline after an intruder hacked into servers at RCN and corrupted the Master Boot Records of several servers, TorrentFreak reports. The process of restoring the sites from backups is only expected to reach completion later on Monday. ®

Endpoint data privacy in the cloud is easier than you think

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
iWallet: No BONKING PLEASE, we're Apple
BLE-ding iPhones, not NFC bonkers, will drive trend - marketeers
Multipath TCP speeds up the internet so much that security breaks
Black Hat research says proposed protocol will bork network probes, flummox firewalls
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
Microsoft's Euro cloud darkens: US FEDS can dig into foreign servers
They're not emails, they're business records, says court
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?