
Nearly two months ago a group of hackers released to BitTorrent a trove of e-mails, source code and other materials that they grabbed from a compromised server or servers belonging to anti-piracy company MediaDefender. Today I obtained a screenshot of a log purporting to show the hackers with root access on the MediaDefender server on April 10th of this year.
I can't verify the authenticity of the log, which could have been fabricated, but the log shows the hackers with root on a server referred to as "PM" at the following IP address: 65.120.42.146.
An internal MediaDefender e-mail that was among those seized by the hackers and released to BitTorrent in September shows MediaDefender employees discussing the hacked "PM" server and its IP address -- the IP address that appears in the log screenshot. That e-mail (shown below) is dated two months after the log showing MediaDefender's server compromised.
MediaDefender didn't respond to a call for comment today. The company also didn't respond to repeated calls in September seeking authentication of the e-mails. But after the e-mails were leaked to BitTorrent, MediaDefender sent a series of takedown notices to sites hosting the e-mails claiming them as trade secrets.
It's unclear when the hackers first breached MediaDefender's security, but a note the hackers posted with some of the purloined material indicates that they'd breached MediaDefender's security as early as January of this year.
See Also:
- Hackers Smack Anti-Piracy Firm Again and Again
- Defense Lawyers Cringe at MediaDefender's Child-Porn Patrol Plans
- MediaDefender's "Swedish" Hackers Attempted to Hack AG Computer
- Leaked E-mail Shows Music Company Using P2P for Market Research
- MPAA Paying Hacker for Purloined TorrentSpy Emails Not Illegal, Court Rules