Feeds

Notorious Anonymous hacktivists launch fresh attacks

Latest counter-offensive after TorrentReactor and other TT sites attacked

Seven Steps to Software Security

Hacktivists from the loosely-banded Anonymous took out the UK Intellectual Property Office and a Portuguese music industry website over the weekend during the latest phase of an ongoing campaign against the entertainment industry.

The ipo.gov.uk and acapor.pt were both rendered inaccessible by floods of spurious traffic in the latest phase of Operation: Payback is a bitch. The campaign is a response by activists to attempts by the entertainment industry to attack file-sharing and torrent tracker sites.

The campaign was sparked off by outrage over the appointment of a tech firm hired gun in India by the Bollywood entertainment industry. Aiplex Software said it was prepared to launch DDoS attacks at Torrent tracker sites that ignored its legal nastygrams.

Cue outrage on 4chan and the launch of reprisal attacks, which have previously affected the MPAA, RIAA and (most notoriously) law firm ACS:Law. The UK-based solicitors' email database was exposed during ham-fisted attempts to restore the site following a secondary denial of service attack partially provoked by ACS:Law's dismissive response to the first wave of attacks.

Panda Security has maintained a detailed scorecard showing the targets of attack, and the resulting site downtimes, in a blog post here.

Sources suggest that the ipo.gov.uk tried pointing its DNS records towards known anonymous servers. However, this attempt to reflect the attack failed to do much good and the IPO's site remained inaccessible on Monday morning.

Meanwhile, in possibly related news, a hack attack on hosting provider Reality Check Network (RCN) took out several Torrent tracker sites over the weekend. TorrentReactor and other torrent tracker sites were taken offline after an intruder hacked into servers at RCN and corrupted the Master Boot Records of several servers, TorrentFreak reports. The process of restoring the sites from backups is only expected to reach completion later on Monday. ®

Mobile application security vulnerability report

More from The Register

next story
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
BMW's ConnectedDrive falls over, bosses blame upgrade snafu
Traffic flows up 20% as motorway middle lanes miraculously unclog
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Attackers raid SWISS BANKS with DNS and malware bombs
'Retefe' trojan uses clever spin on old attacks to grant total control of bank accounts
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.