Welcome guest. Before posting on our computer help forum, you must register. Click here it's easy and free.

Author Topic: Leaked Emails Reveal Profits of Anti-Piracy Cash Scheme  (Read 3269 times)

0 Members and 1 Guest are viewing this topic.

TOF

  • Guest
Leaked Emails Reveal Profits of Anti-Piracy Cash Scheme
« on: September 26, 2010, 10:49:41 AM »
Friday night the anti-piracy law firm ACS:Law accidentally published its entire email archive online, effectively revealing how the company managed to extract over a million dollars (£636,758.22) from alleged file-sharers since its operation started. On average, 30% of the victims who were targeted paid up, and this money was divided between the law firm, the copyright holder and the monitoring company.

http://torrentfreak.com/leaked-emails-reveal-profits-of-anti-piracy-cash-scheme-100926/

kpac

  • Web moderator


  • Hacker

  • kpac®
  • Thanked: 184
    • Yes
    • Yes
    • Yes
  • Certifications: List
  • Computer: Specs
  • Experience: Expert
  • OS: Windows 7
Re: Leaked Emails Reveal Profits of Anti-Piracy Cash Scheme
« Reply #1 on: September 26, 2010, 11:46:33 AM »
How do you accidentally publish something online?

Salmon Trout

  • Guest
Re: Leaked Emails Reveal Profits of Anti-Piracy Cash Scheme
« Reply #2 on: September 26, 2010, 12:25:04 PM »
How do you accidentally publish something online?

You employ an admin who, while responding to a 4Chan DDOS attack, does it in a way that exposes lots of confidential information, including a large email archive. Incidentally, the way the information was obtained does not automatically make it inadmissible in a UK court. According to what I read, in the process of countering the DOS, the default home page was briefly moved. This exposed a listing of the root directory, which happened to contain a backup image, including 350 MB of emails, which was rapidly grabbed by the DOSers and ended up as a torrent on the Pirate Bay.

“Their site came back online [after the DDoS attack] – and on their frontpage was accidentally a backup file of the whole website (default directory listing, their site was empty), including emails and passwords,” a leader of the attacking group said.