Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×

Leaks Prove MediaDefender's Deception 230

Who will defend the defenders? writes "Ars Technica has posted the first installment in their analysis of the leaked MediaDefender emails and found some very interesting things. Apparently, the New York Attorney General's office is working on a big anti-piracy sting and they were working on finding viable targets. It also discusses how some of the emails show MediaDefender trying to spy on their competitors, sanitize their own Wikipedia entry, deal with the hackers targeting their systems, and to quash the MiiVi story even while they were rebuilding it as Viide. Oh yes, they definitely read "techie, geek web sites where everybody already hates us" like Slashdot, too."
This discussion has been archived. No new comments can be posted.

Leaks Prove MediaDefender's Deception

Comments Filter:
  • The weakest link (Score:4, Interesting)

    by kj_in_ottawa ( 838840 ) on Monday September 17, 2007 @09:02AM (#20634995)
    Some smart yet misguided people have their plot foiled by the weakest link, the human. I'm glad this whole miivi thing has been exposed. I think how it has been brought to light serves as a good reminder to the rest of us. No matter how secure your app, or how great your plan, all it takes is one person who doesn't understand policy or the consequences of following it and all is lost. Cheers
  • legal (Score:1, Interesting)

    by Anonymous Coward on Monday September 17, 2007 @09:05AM (#20635035)
    I wonder if any evidence produced by media defender can be used in court, since their systems are hacked and it is perfectly possible that they do now show in court what they initially found, but they show data that was modified by hackers.

    The phone hack makes clear that hackers are quite deep into their systems.
  • Journamalism 101 (Score:5, Interesting)

    by jalefkowit ( 101585 ) <jason@jaso3.14nlefkowitz.com minus pi> on Monday September 17, 2007 @09:06AM (#20635057) Homepage

    I know it's pointless to ask things like this of the /. "editors", but the summary of this story is almost completely useless to anyone who is coming to the story cold (like me).

    Would it have killed someone to have rewritten the submission so that it explained:

    • Who MediaDefender is
    • What the "leaked MediaDefender emails" are
    • What the "MiiVi story" is
    • Why I should care

    ?

    I can go Google all that stuff and find out for myself, but why would I bother, if it's not clear to me why the story is important in the first place?

  • by igb ( 28052 ) on Monday September 17, 2007 @09:14AM (#20635143)
    Of course, in a country with a sensible data protection regime, forwarding personally identifiable information to a weakly-protected gmail account would be a non-no in and of itself, One of the problems with the US's absolute lack of constraints on companies' use of personal data is that the casual mailing of SSNs can go on, and management have no reason to deal with it. In europe, that sort of stuff is locked down into HR department systems.
  • When.... (Score:3, Interesting)

    by Chineseyes ( 691744 ) on Monday September 17, 2007 @09:42AM (#20635435)
    When celebrities have their sex tapes stolen no one goes around saying what a tragedy a crime has been committed. We say what kind of idiot would tape themselves having sex. So why on earth would you think that when MediaDefender has their internal e-mails and tracking database stolen people are going to feel pity for them especially when they do business for such an unsympathetic cause. Instead people are gawking and gloating at this the same way they gawk and gloat when some celebrity they don't like gets caught with their pants down.
  • by JRHelgeson ( 576325 ) on Monday September 17, 2007 @09:44AM (#20635465) Homepage Journal

    But in professional, corporate email communications such a tone has about as much justification as surfing porn at work.

    And to that point - it is their JOB to surf porn at work, to seek out child porn and notify the DoJ and the New York Attorney General's office of the material so that the AG could pursue the offender as part of their own investigation.

    Yet, I do agree that the use of profanity does show a lack of professionalism. Much like the theory that you can tell a lot about a man by the way he treats his waitress. These emails reveal that they have an air of arrogant superiority about themselves, that they operate above the law, and that they are immune from "teh bad d00dz". They are convinced of their moral authority and moral superiority.

    To wit:
    I have a fair level of certainty that they got themselves infected with spyware, adware, trojans. They surf sites in the dark corners of the 'intertoob' seeking out nefarious content, evil trackers and child predators. In going there, they are in the stomping grounds of the best of the worst when it comes to infecting computers using the most current 0day exploits.

    (Side note -- Stick with me here)
    I personally do not run anti-virus. I deal with malicious content all the time. I know what is running on my machine at all times. If I were to run an AntiVirus, it would delete half the files on my hard drive that was gathered as evidence in investigations, or malicious tool kits used to exploit systems that I use in teaching classes.

    Whenever I venture to evil sites, I start up a virtual machine, I have two - they are called "Hindenburg" and "Titanic" that are not current on their patches and run no anti-virus. I purposely seek out infections and malware on these machines so I can analyze the machines postmortem. I have a tremendous amount of respect and even admiration for my opponents. They are VERY good at their game. As such, I am careful not to let my guard down.

    (My point)
    I'll bet that what they've done is get a real machine infected, one that was not sandboxed, connected to the internal domain, and the user was running with not just local admin privileges, but with full domain admin privileges. OOPS! This infected machine reported back to the hackers, who then connected back in to their hacked box and set up user accounts on the network and also rooted the boxes.

    At this point, no amount of changing passwords or firewalls or IDS will get the intruders out. They need to rebuild every box on their network, from scratch. They need to stop thinking of themselves as an "academic institution" that needs full access to the internet (no outbound restrictions on the firewall) and where proper security practices "don't apply to them".

    Proper security and safety protocols were not followed. The arrogant attitude of "we're security folks, policies don't apply to us" is what let this happen.

    Further your affiant sayeth not, :)
    Joel Helgeson
  • by dj245 ( 732906 ) on Monday September 17, 2007 @09:45AM (#20635487) Homepage
    Wikipedia entries tend to be sanitized for companies anyway asa a matter of company policy. Employees aren't supposed to post- its in almost every contract there is. Every contract I have ever seen for a major company has something that basically states you may not act as the PR agent for the company or speak publically for the company. This is basically what you are doing by posting on wikipedia.

    So the guys in PR are the only ones in the company posting over the long term. Anyone else doesn't work for the company, or won't be working there long (yerfired!).
  • Re:Mixed feelings... (Score:3, Interesting)

    by discogravy ( 455376 ) on Monday September 17, 2007 @09:59AM (#20635663) Homepage
    congrats on not understanding strict security policy. you are the type of person who let this miivi/media defender thing go down: the guy who is technical enough to get around the security measures put in place to avoid things like this happening.
  • by yuna49 ( 905461 ) on Monday September 17, 2007 @10:00AM (#20635687)
    I don't see any mention in the article of even an attempt to get the NY AG's office to comment on this story. Nor do I see any mention of it on the AG's own web site. If ars were a newspaper, the editors wouldn't have let this story appear at all without at least an official "no comment" by the Attorney General's office.

    A quick search this am for "new york attorney general mediadefender" turned up no mainstream press reports about this story.

    According the ars piece, by the way, the AG's office appeared to be interested in porn downloads, not, as the editors here put it, "working on a big anti-piracy sting and they were working on finding viable targets." From TFA, "Although the full scope of the project cannot be extrapolated from the e-mails, the information available indicates that MediaDefender intends to provide the Attorney General's office with information about users accessing pornographic content. Other kinds of information could be involved as well." (That last sentence is so vague and general that it could refer to almost any information of any kind anywhere on the planet.)

    Don't the editors at least read the stories themselves before they post them to Slashdot?

    None of these comments is a defense of either MediaDefender or the NYAG. I'm more concerned about the shoddy reporting that passes for journalism on geek news sites like this one and arstechnica. Particularly the latter, since the articles I've read there in the past gave off the semblance of decent journalism.

  • by Martin Blank ( 154261 ) on Monday September 17, 2007 @10:05AM (#20635765) Homepage Journal
    "Casual mailing" of SSNs can (theoretically) get a company in trouble under federal HIPAA laws and under certain state laws like California's SB1386. Many companies are working on locking down their e-mail, often with smart filters that look for strings like SSNs or driver's license numbers, among other things, and automatically encrypting them before going out, sometimes even before leaving the department while remaining within the company.

    This doesn't stop the need for laws which are much more clear and restrictive on the use and control of personally identifying information, and which have more bite when they are enforced.
  • by Opportunist ( 166417 ) on Monday September 17, 2007 @10:11AM (#20635843)
    The average mouse is not stupid enough to fall for the average mousetrap. Instead, you will get the really greedy and the really stupid ones. Which in turn means two things. First of all, you think your mousetrap is working (because you catch mice) and second, you breed more intelligent mice.
  • by aqui ( 472334 ) on Monday September 17, 2007 @11:26AM (#20636935)
    If you dish it out, you shouldn't be surprised when something comes back your way.

    Again I agree with the post above I feel sorry for some of the employees caught in the middle, but have little sympathy for the company.

    When you actively seek to disrupt somebody else's activities (legal or not), especially with questionable tactics it won't make you popular and there is going to be backlash.

    Law enforcement activities should be left to law enforcement officers that have been empowered by democratically elected governments and are accountable for their methods and activities. When individuals or companies begin acting as vigilantes ( URL:http://en.wikipedia.org/wiki/Vigilante ) it undermines the very stability and fairness of a legal system. Fair applications of law require law enforcement and police officers to follow a legal process that minimizes the effect an investigation has on innocent bystanders, all further controlled by legal system and the judiciary.

    I find it most disconcerting that a government law enforcement entity (New York Attorney General's Office) is apparently supporting this vigilante behaviour by turning a blind eye to let someone else do their dirty work.

    There is no doubt that some people are using P2P networks to commit acts of piracy but that does not justify disrupting P2P networks and affecting innocent bystanders, using P2P for legitimate purposes.

  • by teh_chrizzle ( 963897 ) <kill-9@@@hobbiton...org> on Monday September 17, 2007 @11:33AM (#20637065) Homepage

    you can't tell me that the secretary had no idea what business they were in.

    when i lived in seattle, i worked for a startup company in the same building as 180 solutions. our offices were right across the hall from theirs. at the time i had no idea what they did, and i would run into their people in the hall from time to time, usually it was their receptionist. she was really cute and very outgoing, far too nice to be working for such a despicable company. when i learned what they did and saw the collective internet angst directed at them, i wonder if she quit before word got out about them and she got her tires slashed or whatever.

    i am glad that i haven't had to make any career decisions that put me in such a position. when the dotcoms in seattle all went under, i was worried i would have to take contract work for microsoft and listen to my wallet rather than my personal politics. fortunately, such a situation never arose.

  • Re:Actually (Score:5, Interesting)

    by JRHelgeson ( 576325 ) on Monday September 17, 2007 @11:35AM (#20637105) Homepage Journal

    ...the word on the street is simply that one of their staff signed up to a torrent site from one of MediaDefender's IPs with the same gmail address as username and password as he used for his gmail account where all these e-mails had been archived.

    Heh, they all but went out of their way to provide access to the hackers. The top brass had his emails being forwarded to his Gmail account, bypassing any and all security they had set up on the corporate network.

    Then the hackers got the usernames and passwords and gained internal access to the network, establishing admin access on the domain. They apparently set up packet captures, or if MediaDefender were the ones capturing packets, they found them and this is where they captured the VoIP calls.

    "Keyloggers, we don't need no stinking keyloggers!"
    The worst infections to get rid of are those who have admin access to the network and who maintain their access using normal everyday network admin utilities (From my experience, the French are especially good at this). I have worked with sites that have been hacked where the intruders have obtained an administrator level password, then gone in and set up RPC over HTTPS on the domain servers, then the hackers have set up their own 2003 server, added it to the domain, promoted it to domain controller and had the hacked company's Domain Controller perform an outbound sync (using the RPC over HTTPS) to the hackers 2003 server. Any password changes the users make on the home network will be replicated to their off site "guest host" malicious server.

    The hackers later added Distributed File Shares or DFS, and used it to replicate file shares (i.e. user folders) information to their hacked domain controller. The hackers basically set themselves up as a run-of-the-mill remote office that synchronizes over a low-speed wan link.

    This company was totally Pwn3d... I wouldn't be surprised to see the same thing happened here with the amount of information they collected.
  • Re:Mixed feelings... (Score:3, Interesting)

    by TheVelvetFlamebait ( 986083 ) on Monday September 17, 2007 @11:59AM (#20637465) Journal

    These scumbag know that what they are doing is worthless, it doesn't stop piracy, but they both piss off users and rip off their own clients.
    Why is a measure to curb piracy always "worthless"? Just because piracy won't stop tomorrow doesn't mean the approach is bad, or that it isn't making a difference. We still haven't eliminated crime, yet we still pour government funding into police. We can't cure a plethora of diseases, yet we still try to treat them. Why is it always so black and white?
  • Re:Mixed feelings... (Score:2, Interesting)

    by the_lesser_gatsby ( 449262 ) on Monday September 17, 2007 @12:24PM (#20637887) Homepage
    Maybe because the MD's actions on receiving the email was to forward it to his employees with a cover message that basically insulted his customer and implied that he knew that what he (or the customer) was doing was worthless.

    At the very least it's rather unprofessional behaviour. I won't go into how unprofessional it is to have your company's emails leaked onto the internet...
  • Re:Mixed feelings... (Score:3, Interesting)

    by Sloppy ( 14984 ) on Monday September 17, 2007 @01:48PM (#20639549) Homepage Journal

    Why is a measure to curb piracy always "worthless"?

    When that's really all it's about, it's not worthless. But these guys aren't working on the problem of curbing piracy. The only way to curb piracy is to make ethical arguments (to the pirates) about the consequences of taking without paying -- the effects of denying patronage to artists (e.g. causing people to simply give up, causing some to "sell out" and seek dubious/compromising sources of funding, etc). These guys just put up minor roadblocks but don't actually give anyone a good reason to not pirate. Perhaps they are making piracy slightly less attractive compared to purchasing, but whatever they do is going to be so minor that the ill will it generates (and long term: technical resistance) counteracts it.

    Also, one can't help look at these people, without thinking about the snakeoil salesmen who sell DRM to the media companies. DRM causes piracy, and loss of goodwill and revenue to whoever implements it -- the tangible costs to the snakeoil salesmen aside. There's simply no upside, and lots of downside. DRM truly is [less than] worthless, and these guys efforts are going to be tarnished by association, no matter how unfair, because they're going to be seen as part of the same overall misguided strategy. (That strategy being: telling potential customers "fuck you, we don't want your money.")

    Funding police isn't like that. Funding police generally doesn't increase crime, unless you've got corrupt cops.

    The comparison to disease treatment is more interesting, though, in that it evokes images of antibiotic-resistant pathogens. It's possible that these guys' attempts to sabotage communication will result in sabotage-resistant protocols (using signatures and distributed reputation systems, for example). But even in the treatment of disease, it's known and understood that you have to fight it all the way, and using a weak antibiotic ineffectively is a bad idea. That sounds a lot like what these guys are doing. They're training resistance, without actually making the effort to win.

    The xxAA's money would be much better spent on education/propaganda (call it whatever, depending on your point of view ;-).

Our business in life is not to succeed but to continue to fail in high spirits. -- Robert Louis Stevenson

Working...