<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; hacker</title>
	<atom:link href="https://torrentfreak.com/tag/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 19:18:38 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>Hacker Takes Over Torrentz, Sort Of&#8230;</title>
		<link>https://torrentfreak.com/hacker-takes-over-torrentz-sort-of-081116/</link>
		<comments>https://torrentfreak.com/hacker-takes-over-torrentz-sort-of-081116/#comments</comments>
		<pubDate>Sun, 16 Nov 2008 08:48:07 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[Pirate Talk]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[torrentz]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=6632</guid>
		<description><![CDATA[A hacker has successfully changed the nameservers of the popular BitTorrent meta-search engine Torrentz.com. For a few hours the site was replaced with an Adbrite ad, and a link to a warez forum. To top it off, the hacker then contacted the Torrentz admin to brag about his hacking abilities.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/torrentz.jpg" align="right" alt="torrentz">Last week we reported that <a href="http://torrentz.com">Torrentz</a> was facing a <a href="http://torrentfreak.com/torrentz-faces-hostile-domain-takeover-081105/">hostile domain takeover</a>. With a forged driver&#8217;s license, the impostor attempted to change the domain Whois. Yesterday, the nameservers to Torrentz were indeed changed, giving the &#8216;hacker&#8217; control over the Torrentz domain.</p>
<p>Flippy, the admin of Torrentz told us that he noticed some worrying changes when he checked his website late last night. There were banners from <a href="http://www.adbrite.com/">Adbrite</a> at the top and bottom of the site, banners that didn&#8217;t belong there. It turns out that &#8220;the hacker&#8221; we mentioned before, managed to change the nameservers of the torrentz.com domain. In the middle of the new page torrentz.eu was now loading in a frame, so the site was usable apart from the extra ads.</p>
<p>When Flippy added some Javascript to the torrentz.eu site to prevent it from loading inside the frame, the .com domain suddenly linked to some fresh warez forum and an image hosting site. The warez forum, <a href="http://warez2share.com">warez2share.com</a>, was apparently hosted on a shared hosting account, and it didn&#8217;t take long before the account was suspended because of the traffic overload.</p>
<p>The hacker didn&#8217;t stop there of course, and he soon changed the page to a single Adbrite banner. And as if that wasn&#8217;t enough, he decided to email Flippy, to tell him how good of a hacker he is. &#8220;So, I emailed him back, and informed him that I have a lawyer who will subpoena Adbrite first thing in the morning, to get the account&#8217;s details,&#8221; Flippy told us.</p>
<p>After some emails back and forth, the hacker suddenly changed his tone. After Flippy reminded him that forging a US driver&#8217;s license is a serious crime, he suddenly became surprisingly cooperative. Instead of bragging about his hacker skills, he was suddenly willing to change the nameservers back. At the time of publication, the domain details have indeed been reverted, and until the changes clear, torrentz.com is being redirected to the backup domain, torrentz.eu.</p>
<p>It is not over yet though, as Flippy told us that he will do everything he can to find out the identity of the &#8216;hacker&#8217;, so stay tuned.</p>
<p><strong>Update:</strong> The hacker is from California and forged a CA drivers license, which he can be put in jail for. Flippy, however, decided not to go after him, since it would be very costly to do from Poland, and it&#8217;s not worth it for 4 hours downtime.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/hacker-takes-over-torrentz-sort-of-081116/feed/</wfw:commentRss>
		<slash:comments>84</slash:comments>
		</item>
		<item>
		<title>MediaDefender Hacker Speaks Out</title>
		<link>https://torrentfreak.com/mediadefender-hacker-speaks-080114/</link>
		<comments>https://torrentfreak.com/mediadefender-hacker-speaks-080114/#comments</comments>
		<pubDate>Mon, 14 Jan 2008 20:08:56 +0000</pubDate>
		<dc:creator><![CDATA[Enigmax &#38; Ernesto]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[bittorrent]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[mediadefender]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/mediadefender-hacker-speaks-080114/</guid>
		<description><![CDATA[In September 2007, anti-piracy company MediaDefender's emails went public after a hacker gained access to their systems. The attacks cost the company a huge amount of money, not to mention acute embarrassment. Now the person behind the attacks speaks.<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>The whole Media Defender <a href="http://torrentfreak.com/mediadefender-emails-leaked-070915/">scandal</a> needs little introduction. The anti-piracy company is incredibly unpopular with most of the file-sharing community, so when they fell victim to a hacker and their company secrets spread all over the Internet, few held much sympathy for them.</p>
<p>Soon it became known that a shadowy group known as MediaDefender-Defenders appeared to be behind the attack &#8211; they host the Media Defender emails on their <a href="http://www.mediadefender-defenders.com/">website</a> to this day, but little was known about the chain events, or who was behind them &#8211; until now.</p>
<p>In an <a href="http://www.portfolio.com/news-markets/national-news/portfolio/2008/01/14/Media-Defenders-Profile#page1">interview</a> with portfolio, the hacker (using the pseudonym &#8216;Ethan&#8217;) explains how things led up to the leak. Ethan, a polite high-school student who lives with his family, was on his Christmas break when he first gained access to the anti-piracy companies servers by exploiting a weakness in their firewall. This was the end of 2006, at a time when business was still good for Media Defender, with revenue standing at nearly $16m. </p>
<p>The interviewer, Daniel Roth, says he communicated with Ethan on pre-pay phone to ensure security. Meeting after school in a local bookstore, Ethan handed over a flash drive holding confidential Media Defender information, explaining that the initial security breach hadn&#8217;t amounted to much and that he had difficulty in gaining the interest of fellow hackers. However, a few months later Ethan decided to go back and take a second look &#8211; which bore more fruit &#8211; giving him access to the company&#8217;s email, it&#8217;s networked resources and even its telephone system. He then explains how he passed on some of the information to a fellow hacker who gained access to Media Defender servers and used them for denial-of-service attacks.</p>
<p>Logging in a handful of times each month through the summer of 2007, Ethan started to get bored with &#8216;Monkey Defenders&#8217; &#8211; his pet name for the anti-piracy outfit. Deciding to go out with a bang, he and the Media Defender-Defenders gathered thousands of the company&#8217;s internal emails and published them on web.</p>
<p>A text file included with the emails stated: &#8220;By releasing these emails we hope to secure the privacy and personal integrity of all peer-to-peer users. The emails contains information about the various tactics and technical solutions for tracking p2p users, and disrupt p2p services,&#8221; and &#8220;A special thanks to Jay Maris, for circumventing there entire email-security by forwarding all your emails to your gmail account&#8221;</p>
<p>Just days later, slamming the anti-piracy company again and again seemed to be the aim of Ethan and friends, as they released a private <a href="http://torrentfreak.com/more-mediadefender-leaks-070916/">telephone</a> conversation with the New York attorney general&#8217;s office, a P2P tracking database, followed a few days later by all of Media Defender&#8217;s <a href="http://torrentfreak.com/mediadefender-anti-piracy-tools-leaked-070920/">anti-piracy tools</a>.</p>
<p>Ethan said that he didn&#8217;t set out to ruin Media Defender: &#8220;In the beginning, I had no motivation against Monkey Defenders&#8221; he said. &#8220;It wasn&#8217;t like, &#8216;I want to hack those bastards&#8217;. But then I found something, and the good nature in me said, These guys are not right. I&#8217;m going to destroy them.&#8221;</p>
<p>Ethan, who is now sought after by the FBI because of the leaked emails, is getting close to this goal. It all went downhill for MediaDefender after the leaks got out. In November it turned out that MediaDefender&#8217;s parent company ArtistDirect lost almost $1,000,000 because of the hack, and their stock price <a href="http://torrentfreak.com/mediadefender-stock-plunges-due-to-leaked-emails-071222/">plunged</a> soon after that.</p>
<p>To make it even worse, a week after the sensitive information was made public, the Pirate Bay launched a counterattack against their arch rival. They decided to use the information from the emails to <a href="http://torrentfreak.com/piratebay-fires-a-broadside-of-complaints-to-police/">file charges</a> against some of MediaDefenders customers including Paramount Home Entertainment, Twentieth Century Fox and Universal Music Group for corrupting and sabotaging their BitTorrent tracker.</p>
<p>There is no doubt that the pirates have won this battle, and it will be very hard for MediaDefender to regain their credibility. To quote MediaDefender CEO Randy Saaf: &#8220;This is really fucked&#8230;&#8221;. Yes, I&#8217;m afraid it is Randy.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/mediadefender-hacker-speaks-080114/feed/</wfw:commentRss>
		<slash:comments>102</slash:comments>
		</item>
		<item>
		<title>14 Year Old BitTorrent Hacker Threatens to Sue What.cd Users</title>
		<link>https://torrentfreak.com/14-year-old-hacker-threatens-whatcd-071112/</link>
		<comments>https://torrentfreak.com/14-year-old-hacker-threatens-whatcd-071112/#comments</comments>
		<pubDate>Mon, 12 Nov 2007 18:11:37 +0000</pubDate>
		<dc:creator><![CDATA[enigmax]]></dc:creator>
				<category><![CDATA[Hot Off The Press]]></category>
		<category><![CDATA[Torrent Sites]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[oink]]></category>
		<category><![CDATA[p3t3r]]></category>
		<category><![CDATA[RIAA]]></category>
		<category><![CDATA[waffles]]></category>
		<category><![CDATA[what.cd]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/14-year-old-hacker-threatens-whatcd-071112/</guid>
		<description><![CDATA[Users of OiNK-replacement What.cd, are receiving emails from what appears to be the RIAA. In it are threats that users must either stop their 'criminal acts of piracy' or have charges pressed against them. But is it the RIAA? Rival Waffles.fm? No, it's a 14 yr old script kiddie out for revenge, says What.cd<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com//images/whatcdlogo.jpg" align="right" alt="web sheriff"></p>
<p>Users of What.cd were in for more than a little shock today. Members of one of the OiNK <a href="http://torrentfreak.com/what-waffles-hydra-071030/">replacement</a> sites started receiving worrying emails from the music file-sharers arch nemesis &#8211; the mighty RIAA.</p>
<p>The email reads:</p>
<blockquote><p>Date: 12 Nov 2007 11:35:46 +0100<br>
Message-ID: <2007111XXXXXXX.XXXXX.qmail@bitient.org><br>
To: XXXXXXX<br>
Subject: Music Piracy<br>
From: piracy@riaa.org<br>
Reply-To: piracy@riaa.org<br>
X-Originating-IP: [76.74.24.143]<br>
X-Originating-Email: [piracy@riaa.org]<br>
X-Mailer: Internet Mail Service</p>
<p>Dear registered user of the site What.cd,</p>
<p>We have recently been investigating the activities of the users of the site http://www.what.cd/ and we have found that this site exists for the sole purpose of music piracy.</p>
<p>Pirating music is a criminal offence and we believe it should be obvious  to you that the results outweigh the benefits &#8211; hard working artists won&#8217;t be rewarded for their work and will stop producing music, ultimately leading to a severely reduced selection of music both in the shops and for download.</p>
<p>The RIAA had hoped that the disabling by the police of the large illegal music site, Oink.cd, would stop a lot of people from engaging in piracy, as they don&#8217;t want to be seen as criminals. However, this appears to not be the case, as two large new sites have sprung up in its place.</p>
<p>This email is the final warning to all of you who were members of Oink.cd and are current members of What.cd. If we find you to be committing any more criminal acts of piracy then we will have to press charges against you, as representatives of the major record companies of<br>
America.</p>
<p>Yours Faithfully,</p>
<p>The RIAA</p></blockquote>
<p>Worrying, especially as the <a href="http://whois.domaintools.com/76.74.24.143">IP address</a> in the email seems to indicate it really is from the RIAA. Visitors to the What.cd site were then greeted with this message:</p>
<blockquote><p>This week has been terrible. After we did two code audits and fixed our security issues, our wonderful attackers couldn&#8217;t get in (yay!), so they turned to brute force. After having been hit by several port scans and a rather fearsome DDoS attack (traffic reaching almost 80 megabits per second (note: that&#8217;s 10 megabytes per second)) our server pretty much went to hell. After an extended downtime (ending a couple hours ago) during which we tweaked firewall settings, etc., we decided that it was safe enough to bring the site back up.</p>
<p>Pretty much immediately after the site came back up we had someone trying to brute force our (well passworded) ssh accounts (they&#8217;ve now met the hot burny side of the firewall).</p>
<p>What have we learned from all this? That there is a person or a group of people somewhere that wants us to disappear. We originally thought that the attacks were by bored kids, but whoever was behind the DDoS appears to be much more serious than that. We aren&#8217;t going to publicly speculate on who is behind the attacks &#8211; we&#8217;ll leave that to you guys.</p>
<p>Despite these attacks, we are still up and running, and we hope to stay this way for a very long time. We have plans for this site, and we aren&#8217;t going to flush them down the drain just because some people don&#8217;t like what we&#8217;re doing. The first of our plans involves a very cool freeleech plan, but we&#8217;re going to wait until we&#8217;re sure the tracker&#8217;s relatively stable for<br>
that. For the time being, we&#8217;re keeping freeleech on until further notice.</p></blockquote>
<p>But what about the emails? Is the RIAA really sending them out? If not, then who is and how did they get the What.cd user database? What.cd think they have the answer in a post on their site, replicated on this <a href="http://pastebin.ca/770821">Pastebin</a> page.</p>
<p>Other sites are already publishing the information above and a quick Google search does indeed reveal some interesting details. Apparently, the person held responsible for the hacking and the RIAA email is only 14 year old and not as much as a threat some believed him to be. The alleged hacker&#8217;s date of birth, his hometown, hobbies and much more are detailed on Google.</p>
<p>Before today, he probably enjoyed telling the world about himself on social networking sites too.</p>
<p>He&#8217;s also mentioned on this Pastebin <a href="http://pastebin.ca/raw/764328">page</a> full of haxor code &#8211; along with what.cd.</p>
<p>The youth of today&#8230;.what&#8217;s the world coming to?</p>
<p><strong>Update:</strong> It appears someone claiming to be &#8216;biscuit&#8217; offered the database for <a href="http://pastebin.ca/770935">sale</a> and even threatened to send it to the RIAA. After deciding that he should keep it &#8211; for later &#8216;blackmail&#8217; purposes he hopefully considered this <a href="http://pastebin.ca/770935">link</a> and realized it&#8217;s not worth it, deleted the database and forgot all about it.</p>
<p><strong>Update:</strong> biscuit wrote that he&#8217;s not responsible for the hacking and claims that the bash log is doctored.</p>
<p>Source: <a href="https://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://torrentfreak.com/14-year-old-hacker-threatens-whatcd-071112/feed/</wfw:commentRss>
		<slash:comments>155</slash:comments>
		</item>
	</channel>
</rss>
