Megaupload arrests and shutdown spark hack attacks

Summary:US authorities have shut down the file-sharing site Megaupload and arrested its proprietors, in a huge crackdown that has prompted possible attacks by Anonymous hackers

US authorities have shut down file-sharing site Megaupload and arrested its proprietors, setting off an apparent campaign by Anonymous hackers to take down the websites of rights-holders such as Universal Music.

Megaupload and related sites run by the same people represent an "international organised criminal enterprise allegedly responsible for massive worldwide online piracy of numerous types of copyrighted works", the US Department of Justice (DoJ) and the FBI said on Thursday.

Seven people have been charged with racketeering, copyright infringement and money laundering. Several of the charges involve conspiracy, and the maximum sentences for the various charges range from five to 20 years each.

The authorities said the company, which describes itself as providing "the leading online storage and file delivery service", has generated more than $175m (£113m) in "criminal proceeds" from the use of its sites to commit and enable the theft of copyrighted works.

For a premium, Megaupload users could have unlimited file storage and give other people direct links to the material they were hosting there. In December, the company launched a new service called Megabox, which was a web-based music locker and player with an integrated music store.

Anonymous response

The DoJ said it has seized Megaupload's domains. The main site was inaccessible at the time of writing, as was that for Universal Music. According to a Twitter account purporting to be associated with the hacking collective Anonymous, Universal was taken down by the hackers in retaliation for the Megaupload arrests.

Several web pages have been loaded with JavaScript, and the simple act of rendering that page in a web browser will in most cases recruit the browsing computer to the DDoS attack.

– Rik Ferguson, Trend Micro

Tweets from a better known Anonymous-related account claimed that the justice.gov and fbi.gov sites had also been taken down. Both were up at the time of writing.

According to Trend Micro security expert Rik Ferguson, Anonymous supporters used the Low Orbit Ion Cannon and a new technique of embedded JavaScript to carry out the distributed denial-of-service (DDoS) attacks. "Several web pages have been loaded with JavaScript, and the simple act of rendering that page in a web browser will in most cases recruit the browsing computer to the DDoS attack," he wrote in a blog post.

The hip-hop producer Swizz Beatz, who has not been charged, was reportedly listed on Megaupload's site as being the company's chief executive. However, there is as yet no public evidence stating that he really had a share in the business or helped to run it.

Beatz, whose real name is Kasseem Dean, had previously organised a promotional video for the site featuring stars including his wife Alicia Keys, and others such as Will.i.am, Diddy and Kanye West. Universal Music ordered the video to be taken down from YouTube, claiming it had not authorised its signed artists to appear in it.

New Zealand arrests

The DoJ said four of the alleged conspirators were arrested in New Zealand at the request of US authorities. One of the detainees is Kim Dotcom, also known as Kim Schmitz and Kim Tim Jim Vestor, a resident of Hong Kong and New Zealand who was the alleged leader of the organisation.

Dotcom founded Megaupload and is the "director and sole shareholder of Vestor Limited, which has been used to hold his ownership interests in the Mega-affiliated sites", the DoJ said.

The others arrested in Auckland include Finn Batato, Megaupload's German chief marketing officer; Mathias Ortmann, the German chief technical officer; and Bram van der Kolk, a Dutch programmer.

Three other suspects are still at large: Julius Bencko, the company's Slovakian graphic designer; Sven Echternach, the German head of business development; and Andrus Nomm, the Estonian head of software development.

In addition to the arrests, authorities in the US and eight other countries executed search warrants and seized around $50m in assets. Server sites were targeted in Virginia and Washington, DC, and in the Netherlands and Canada. A total of 18 domains were ordered seized by a Virginia court.

According to the DoJ and FBI, the UK's Metropolitan Police assisted in the FBI-led investigation, as did police and prosecutors in the Netherlands, Hong Kong, Germany, Australia and the Philippines.


Get the latest technology news and analysis, blogs and reviews delivered directly to your inbox with ZDNet UK's newsletters.

Topics: Security

About

David Meyer is a freelance technology journalist. He fell into journalism when he realised his musical career wouldn't be paying many bills. His early journalistic career was spent in general news, working behind the scenes for BBC radio and on-air as a newsreader for independent stations. David's main focus is on communications, of both... Full Bio

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Related Stories

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.