Jump to content

Operation Payback: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
added info about the sarah palins website 'hack'
Line 69: Line 69:


===Sarah Palin===
===Sarah Palin===
On December 8, [[Sarah Palin]] announced that his website and personal credit card information were cyber-attacked.<ref name="sarah-1"/> Palin team believe the attack was executed by Operation Payback, in despite Operation Payback never tweeted anything about choosing Sarah as a target for DDoS attack.<ref name="metro">{{cite web |url=http://www.metro.co.uk/tech/849918-sarah-palin-website-hit-by-wikileaks-operation-payback-ddos-attack |title=Sarah Palin website hit by WikiLeaks Operation Payback DDoS attack |date=2010-12-09 |accessdate=2010-12-09 |work=metro.co.uk |publisher=[[Metro (British newspaper)|Metro]] |first=Tom |last=Phillips}}</ref><ref name="sarah-2"/><ref name="sarah-1"/> The tech team posted a [http://abcnews.go.com/Politics/page?id=12348896 screenshot] of the server logs files showing the wikileaks.org [[URL]]<ref name="sarah-1"/><ref name="sarah-2">{{cite web |url=http://www.theatlanticwire.com/opinions/view/opinion/Is-Palin-Just-Using-Operation-Payback-to-Get-Attention-6125 |title=Is Palin Just Using 'Operation Payback' to Get Attention? |first=John |last=Hudson |work=theatlanticwire.com |publisher=The Atlantic Wire |date=2010-12-09 |accessdate=2010-12-09}}</ref> Visa attacks has been denial of service attacks, and credit card data was not compromised. It's unkown whether Palin's card was compromised as part of a broad attack on Visa or a specific atack on the Palins.<ref name="sarah-2"/> Sarah Palin has already been [[Sarah Palin email hack|hacked]] by Anonymous in 2008.
On December 8, [[Sarah Palin]] announced that her website and personal credit card information were compromised.<ref name="sarah-1"/> Palin's team believed the attack was executed by Anonymous, though Anonymous never tweeted anything about choosing Sarah as a target for the DDoS attack.<ref name="metro">{{cite web |url=http://www.metro.co.uk/tech/849918-sarah-palin-website-hit-by-wikileaks-operation-payback-ddos-attack |title=Sarah Palin website hit by WikiLeaks Operation Payback DDoS attack |date=2010-12-09 |accessdate=2010-12-09 |work=metro.co.uk |publisher=[[Metro (British newspaper)|Metro]] |first=Tom |last=Phillips}}</ref><ref name="sarah-2"/><ref name="sarah-1"/> Her technical team posted a [http://abcnews.go.com/Politics/page?id=12348896 screenshot] of a server log file showing the wikileaks.org [[URL]]<ref name="sarah-1"/><ref name="sarah-2">{{cite web |url=http://www.theatlanticwire.com/opinions/view/opinion/Is-Palin-Just-Using-Operation-Payback-to-Get-Attention-6125 |title=Is Palin Just Using 'Operation Payback' to Get Attention? |first=John |last=Hudson |work=theatlanticwire.com |publisher=The Atlantic Wire |date=2010-12-09 |accessdate=2010-12-09}}</ref> Visa attacks had been denial of service attacks, but credit card data was not compromised. It is unknown whether Palin's card was compromised as part of a broad attack on Visa or a specific attack on the Palins.<ref name="sarah-2"/> Sarah Palin has already been [[Sarah Palin email hack|hacked]] by Anonymous in 2008.


==Criticism==
==Criticism==

Revision as of 02:48, 10 December 2010

File:Operation payback.jpg
Operation Payback Logo

Operation Payback is a coordinated group of attacks on opponents of internet piracy by internet activists. It was created by users of 4chan, an online community which also gave rise to the Project Chanology attacks by Anonymous against the Church of Scientology as well as other internet memes.[1]

Operation Payback started as retaliation to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. In December 2010, following the United States diplomatic cables leak, the organizers commenced DDoS attacks on websites of banks who had withdrawn banking facilities from WikiLeaks.[2][3]

History

Origins

File:Operation Payback GMlegal.png
Media detailing the attack on Gallant Macmillian

In 2010, several Bollywood companies hired Aiplex Software to launch DDoS attacks on websites that did not respond to software takedown notices.[1][4] Piracy activists then created Operation Payback in September 2010 in retaliation.[1] The original plan was to attack Aiplex Software directly, but upon finding some hours before the planned DDoS that another individual had taken down the firm's website on their own, Operation Payback moved to launching attacks against the websites of copyright stringent organisations Motion Picture Association of America (MPAA) and International Federation of the Phonographic Industry, giving the two websites a combined total downtime of 30 hours.[5][6] In the following two days, Operation Payback attacked a multitude of sites affiliated with the MPAA, the Recording Industry Association of America (RIAA),[7] and British Phonographic Industry.[1] Law firms such as ACS:Law, Davenport Lyons and Dunlap, Grubb & Weaver were also attacked.[8][9][10][11]

On 27 September 2010, the DDoS attack on the Australian Federation Against Copyright Theft (AFACT) unintentionally brought down 8,000 other small websites hosted on the same server.[12]

On 30 September, the Leesburg, VA office of Dunlap, Grubb & Weaver law firm - also doing business as the "U.S. Copyright Group"[13] - was evacuated by the police after a bomb threat was received.[14][15] It's believed the event could be connected to Anonymous.[16] Also non-related copyright or law firms sites were attacked like websheriff.com[11] These attacks were originally organized through an Internet Relay Chat channel.[1] The attacks also became a popular topic on Twitter.[1]

On 4 October 2010, Operation Payback launched an attack on the Ministry of Sound website and the Gallant Macmillian website.[17] As of 7 October 2010, total downtime for all websites attacked during Operation Payback was 537.55 hours.[6]

On 15 October 2010, Copyprotected.com was SQL injected and defaced,[6][18] and three days later Operation Payback launched a DDoS attack against the UK Intellectual Property Office.[19] Production companies SatelFilm.at and Wega-Film.at were hit by "drive-by" DDoSes during October 21, 2010, in response to their efforts to gain a court injuncture against an ISP that refused to block a movie streaming website,[20] and Operation Payback then knocked popular porn website Hustler.com offline the following day.[20]

ACAPOR defacement and data leak

On September 2010, in an attempt to ensure that Portuguese citizens can’t access thepiratebay.org, Associação do Comércio Audiovisual de Portugal (ACAPOR) has filed a complaint against The Pirate Bay. The complaint was filed with the General Inspection of Cultural Activities, which is part of the Portuguese Ministry of Culture. According to the movie rental association, The Pirate Bay is directly responsible for about 15 million illegal downloads in Portugal every year. By installing a Pirate Bay block at all ISPs, ACAPOR hopes to decrease the financial damage they claim it causes.[21]

On 18 October 2010, ACAPOR website was defaced, presenting a speech from Operation Payback and a redirect to The Pirate Bay after a few seconds. In addition to defacing the website, they also managed to grab a copy of the email database of ACAPOR and uploaded it to thepiratebay.org.[22][23] The leaked e-mails so far revealed ACAPOR's methods of denunciation, their dissatisfaction with the Portuguese government and justice system,[24] their perception of the copyright debate as war, and their antagonism with the ISPs. ACAPOR claimed that "the business of ISPs is illegal downloading."[25]

ACS Law data leak

On 21 September 2010, the website of ACS:Law was subjected to a DDoS attack as part of Operation Payback. When asked about the attacks, Andrew Crossley, owner of ACS:Law, said: "It was only down for a few hours. I have far more concern over the fact of my train turning up 10 minutes late or having to queue for a coffee than them wasting my time with this sort of rubbish."[8][10]

When the site came back online, a 350MB file which was a backup of the site was visible to anyone for a short period of time.[26] The backup, which included copies of emails sent by the firm, was downloaded and made available onto various peer-to-peer networks and websites including The Pirate Bay.[26][27][28] Some of the emails contained unencrypted Excel spreadsheets, listing the names and addresses of people that ACS:Law had accused of illegally sharing media. One contained over 5,300 Sky broadband customers whom they had accused of illegally sharing pornography,[29][30] while another contained the details of 8,000 Sky customers and 400 Plusnet customers accused of infringing the copyright on music by sharing it on peer-to-peer networks.[31] This alleged breach of the Data Protection Act has become part of the ongoing investigation into ACS:Law by the Information Commissioner's Office.[32]

Gene Simmons

During the 2010 MIPCOM convention, Gene Simmons of KISS stated:

Make sure your brand is protected...Make sure there are no incursions. Be litigious. Sue everybody. Take their homes, their cars. Don't let anybody cross that line.[33]

In response to Gene Simmons' encouragement of companies taking a more aggressive stance towards copyright infringement,[34] members of Operation Payback switched their attentions to his two websites SimmonsRecords.com and GeneSimmons.com, taking them both offline for a total of 1 day and 14 hours.[6][35] At some point during the course of this DDoS, GeneSimmons.com was hacked and redirected to ThePirateBay.org,[36] In response to the attack Simmons wrote:

Some of you may have heard a few popcorn farts re: our sites being threatened by hackers.

Our legal team and the FBI have been on the case and we have found a few, shall we say "adventurous" young people, who feel they are above the law.

And, as stated in my MIPCOM speech, we will sue their pants off.

First, they will be punished.

Second, they might find their little butts in jail, right next to someone who's been there for years and is looking for a new girl friend.

We will soon be printing their names and pictures.

We will find you.

You cannot hide.

Stay tuned[37]

This led to additional attacks and subsequently more downtime for his websites.[37][38][39][40] Later, Simmons's message was removed from his website.[41]

File:Operation Payback.png
Poster detailing the attack on the RIAA

RIAA attack

On October 26, 2010, LimeWire was ordered to disable the "searching, downloading, uploading, file trading and/or file distribution functionality" after losing a court battle with the RIAA over claims of copyright infringement. The RIAA also announced intentions to pursue legal action over the damages caused by the program in January to compensate the affected record labels.[42][43] In retaliation,[44] members of Operation Payback announced that they will attack RIAA's website on October 29, despite that the group typically doesn't hit targets twice.[45][46] On October 29, riaa.org was taken offline via denial-of-service attack.[47][48] After the attack, riaa.com and riaa.org sites became unavailable from Europe.[49] Operation Payback's main site got attacked later that day and they moved their website from tieve.tk to anonops.net. It's believed the attack on tieve.tk was conducted by the RIAA.[50][51]

November 5th

File:5th November Operation Payback.jpg
Operation Payback participants in Valladolid, Spain

Around October 28, 2010, the group set up a new website with the intention of coordinating protests around the world to raise awareness of their cause. The date for the protest activities were on November 5, the intended day of the Gunpowder Plot, which Anonymous heavily affiliates with through its use of Guy Fawkes masks. After that event, Operation Payback took a break from attacking websites to organize.[52]

FBI investigation

After an attack on the United States Copyright Office, the FBI launched an investigation. FBI representatives did not respond to interview requests.[53]

Operation Avenge Assange

In December 2010, WikiLeaks came under intense pressure to stop publishing secret United States diplomatic cables. Corporations such as Amazon, PayPal, PostFinance, MasterCard and Visa either stopped working with or froze donations to WikiLeaks, some due to political pressures. In response, those behind Operation Payback directed their activities against these companies for dropping support to WikiLeaks.[2] Operation Payback launched DDoS attacks against PayPal, the Swiss bank PostFinance and the Swedish Prosecution Authority.[54][55][56] On 8 December 2010, a coordinated DDoS attack by Operation Payback brought down both the MasterCard and Visa websites.[57][58][59][60] On the 9th December 2010, prior to a sustained DDoS attack on the Paypal website that caused a minor slowdown to their service, Paypal announced on its blog that they would release all remaining funds in the account of the Wau Holland Foundation that was raising funds for WikiLeaks, but would not reactivate the account.[61][62] Regarding the attacks, Wikileaks spokesman Kristinn Hrafnsson said: “We neither condemn nor applaud these attacks. We believe they are a reflection of public opinion on the actions of the targets.”[63] On the same day, a 16-year-old boy was arrested in The Hague, Netherlands, in connection with the distributed denial-of-service attacks against MasterCard and PayPal.[64][65][66]

Sarah Palin

On December 8, Sarah Palin announced that her website and personal credit card information were compromised.[67] Palin's team believed the attack was executed by Anonymous, though Anonymous never tweeted anything about choosing Sarah as a target for the DDoS attack.[68][69][67] Her technical team posted a screenshot of a server log file showing the wikileaks.org URL[67][69] Visa attacks had been denial of service attacks, but credit card data was not compromised. It is unknown whether Palin's card was compromised as part of a broad attack on Visa or a specific attack on the Palins.[69] Sarah Palin has already been hacked by Anonymous in 2008.

Criticism

The United Kingdom Intellectual Property Office said that when its site was attacked, those responsible were basically depriving British citizens of access to information they have a democratic right to see, and by taking offline Kiss member Gene Simmons' sites, Operation Payback members were basically depriving him of his right to free speech.[70]

A spokesman for the MPAA said: "It's troubling that these groups seem more concerned about the rights of those who steal and copy films, music, books, and other creative resources than the rights of American workers who are producing these products." [53]

There was also some criticism from the Pirate Party UK and United States Pirate Party, who in a joint public statement urged the group to "Immediately cease the Distributed Denial-of-Service (DDoS) attacks and to instead seek out a legal method to express your frustration and disquiet with the copyright industry, and their perversions of copyright law for personal gain” [71]

Censorship

On December 8, 2010 Operation Payback's Facebook page was removed and their official Twitter account was suspended.[72][73][74][75] Also, according to Valleywag, Encyclopedia Dramatica was forced to delete their article on Operation Payback after the website received federal court orders to cease any further online documentation of the attacks.[76][77]

Targets

File:Anonymous-Attacks-the-United-States-Copyright-Office-3.jpg.png
Anonymous flier giving the US Copyright Office as a target.
File:Wikileaks.png
Flier announcing the attack on the US Senate
Target[78] Site[78] Attack time[78]
ACS:Law acs-law.org.uk 2010-10-03 19:00 UTC
RIAA riaa.org 2010-10-29 21:00 UTC
Motion Picture Association of America mpaa.org
Aiplex Software aiplex.com
Davenport Lyons davenportlyons.com
TMG Image Over Networks tmg.eu
Australian Federation Against Copyright Theft (AFACT) afact.org.au
DG Legal dglegal.com
Gallant Macmillan gmlegal.co.uk 2010-10-12 18:00 UTC
Ministry of Sound ministryofsound.com 2010-10-03 19:00 UTC
Sociedad General de Autores y Editores (SGAE) sgae.es 2010-10-06
Ministerio de Cultura mcu.es 2010-10-06
Promusicae promusicae.es 2010-10-06
Federation of the Italian Music Industry (FIMI) fimi.it 2010-10-09
International Federation of the Phonographic Industry (IFPI) ifpi.it 2010-10-09
pro-music.it 2010-10-09
United Kingdom Intellectual Property Office ipo.gov.uk 2010-10-16 17:00 UTC
Associação do Comércio Audiovisual de Portugal acapor.pt 2010-10-18
Gene Simmons genesimmons.com 2010-10-19
Satel Film satelfilm.at 2010-10-22
Hustler hustler.com 2010-10-22
FACT fact-uk.org.uk 2010-10-24 22:00 UTC
antipiracy.fi antipiracy.fi 2010-10-26
United States Copyright Office copyright.gov 2010-11-03 15:00 UTC
Irish National Federation Against Copyright Theft infact.ie 2010-11-06 18:15 UTC
International Federation of the Phonographic Industry ifpi.org 2010-11-26
Warner Bros. warnerbros.com 2010-12-01 18:00 UTC

Operation Avenge Assange

File:Avenge Assange Anonymous.png
Flier for Operation Avenge Assange
Target[78] Site[78] Attack time[78]
PostFinance postfinance.ch 2010-12-06
Swedish Prosecution Authority aklagare.se 2010-12-07
EveryDNS everydns.com 2010-12-07
Joseph Lieberman lieberman.senate.gov 2010-12-08
MasterCard mastercard.com 2010-12-08 10:30 UTC
Borgstrom and Bodström advbyra.se 2010-12-08
Visa visa.com 2010-12-08 21:00 UTC
Sarah Palin[67] sarahpac.com 2010-12-08
Paypal paypal.com 2010-12-09 02:50 UTC
Amazon[79] amazon.com 2010-12-09 23:00 UTC
Modified version of LOIC

Tools and communication

Operation Payback members use a modified version of the Low Orbit Ion Cannon (LOIC) to execute the DDoS attacks.[80] In September 2010, a "Hive Mind" mode was added to the LOIC.[80] While in Hive Mind mode, the LOIC connects to IRC, where it can be controlled remotely. This allows computers with LOIC installed on them to behave as if they were a part of a botnet. Utilising this tool, the coordinators of Operation Payback were able to quickly take down websites belonging to anti-piracy groups.[80] Botnets of all sizes have also been used.[81]

See also

References

  1. ^ a b c d e f Leyden, John (2010-09-22). "4chan launches DDoS against entertainment industry". The Register. Retrieved 2010-10-22.
  2. ^ a b Sean-Paul Correll (2010-12-06). "Operation:Payback broadens to "Operation Avenge Assange"". pandasecurity.com. Panda Security. Retrieved 2010-12-09.
  3. ^ Mackey, Robert (2010-12-06). "Latest Updates on Leak of U.S. Cables, Day 9". NYTimes.com. The New York Times. Retrieved 2010-12-07.
  4. ^ "Activists target recording industry websites". BBC News. 2010-09-20. Retrieved 2010-10-27.
  5. ^ enigmax (2010-09-18). "4chan DDoS Takes Down MPAA and Anti-Piracy Websites". TorrentFreak. Retrieved 2010-10-27.
  6. ^ a b c d Correll, Sean-Paul (2010-09-17). "4chan Users Organize Surgical Strike Against MPAA". Pandalabs Security. Retrieved 2010-10-22.
  7. ^ enigmax (2010-09-19). "4chan to DDoS RIAA Next – Is This the Protest of the Future?". TorrentFreak. Retrieved 2010-10-27.
  8. ^ a b Williams, Chris (2010-09-22). "Piracy threats lawyer mocks 4chan DDoS attack". The Register. Retrieved 2010-10-22.
  9. ^ Leyden, John (2010-09-24). "Second piracy threat lawyers withstand DDoS attack". The Register. Retrieved 2010-10-22.
  10. ^ a b ""Operation Payback" attacks to go until "we stop being angry"". Ars Technica. 2010-09-30. Retrieved 2010-10-23.
  11. ^ a b "US Copyright Group and Web Sheriff Targeted in DDoS Attack". Slyck. 2010-09-29. Retrieved 2010-10-23.
  12. ^ "Operation Payback directs DDoS attack at AFACT". ITNews.
  13. ^ "Hurt Locker Subpoenas Arrive With New Language... And Higher Demands". 2010-09-03. Retrieved 2010-11-28.
  14. ^ Erika Jacobson Moore (2010-09-30). "Investigators Track Leads In Bomb Threat At Leesburg Law Office". leesburg2day.com. Leesburg Today. Retrieved 2010-10-27.
  15. ^ "Leesburg Police Investigating Bomb Threat". leesburgva.gov. 2010-09-30.
  16. ^ Ernesto (2010-10-01). "Anti-Piracy Law Firm Evacuated After Bomb Threat". TorrentFreak. Retrieved 2010-10-27.
  17. ^ Leydon, John (2010-10-04). "Ministry of Sound floored by Anonymous". The Register. Retrieved 2010-10-22.
  18. ^ enigmax (2010-10-15). "MPAA Copy-Protected DRM Site Hacked By Anonymous". TorrentFreak. Retrieved 2010-10-27.
  19. ^ Leydon, John (2010-10-18). "Notorious Anonymous hacktivists launch fresh attacks". The Register. Retrieved 2010-10-22.
  20. ^ a b Mennecke, Thomas (2010-10-21). "Operation: Payback Hits SatelFilm.at with 'Drive By' DoS". Slyck News. Retrieved 2010-10-26. Cite error: The named reference "slycknews" was defined multiple times with different content (see the help page).
  21. ^ Ernesto (2010-09-16). "Movie Rental Outfit Calls For Nationwide Pirate Bay Block". TorrentFreak.
  22. ^ Ernesto (2010-10-18). "Movie Rental Outfit Hacked, Emails Leaked, Redirected to The Pirate Bay". TorrentFreak.
  23. ^ Brian Houston (2010-10-18). "ACAPOR Emails Leaked to The Pirate Bay". unitethecows.com.
  24. ^ Pavel (2010-10-04). "A Look Into ACAPOR's Emails: Denunciation, Discontent and Education". Peer Authority.
  25. ^ Pavel (2010-10-11). "Back to ACAPOR: The War and the ISP". Peer Authority.
  26. ^ a b Leydon, John (2010-09-27). "Anti-piracy lawyers' email database leaked after hack". The Register. Retrieved 2010-10-22.
  27. ^ "Leaked emails fuel anti-piracy scandal". Wired.co.uk. 2010-09-27. Retrieved 2010-09-27.
  28. ^ "ACS:Law Anti Piracy Law Firm Torn Apart by Leaked Emails". TorrentFreak. 2010-09-25.
  29. ^ Emery, Daniel (2010-09-27). "Adult video-sharing list leaked from law firm". BBC News. Retrieved 2010-09-27.
  30. ^ "'My details appeared on 'porn' list'". BBC. 2010-09-28.
  31. ^ Emery, Daniel (2010-09-28). "Fresh ACS:Law file-sharing lists expose thousands more". Retrieved 2010-09-28.
  32. ^ Emery, Daniel (2010-09-29). "BT embroiled in ACS:Law porn list breach". Retrieved 2010-09-29.
  33. ^ Lasar, Matthew. "KISS frontman on P2P: "Sue everybody. Take their homes, their cars."". Ars Technica. Retrieved 20 October 2010.
  34. ^ Halliday, Josh (2010-10-14). "Gene Simmons gets kiss of death from notorious web forum". The Guardian. Retrieved 2010-10-22.
  35. ^ Mennecke, Thomas (October 13, 2010). "Slyck News - Anonymous Strikes at KISS Frontman Gene Simmons With DDoS Attack". Slyck News. Retrieved 20 October 2010.
  36. ^ Chalk, Andy (2010-10-19). "Gene Simmons Declares War on Anonymous". Escapist Magazine. Retrieved 2010-10-22.
  37. ^ a b Mennecke, Thomas (October 17, 2010). "Gene Simmons Directly Threatens Anonymous With Legal Action, Jail Time". SLYK. Retrieved 20 October 2010.
  38. ^ Read, Max (Oct 18, 2010). "Gene Simmons Doesn't Understand the Internet". Gawker. Retrieved 20 October 2010.
  39. ^ Anderson, Nate. "Gene Simmons vs. Anonymous: Who's the bigger tool?". Ars Technica. Retrieved 20 October 2010.
  40. ^ "Gene Simmons vs Anonymous". Retrieved 20 October 2010.
  41. ^ "GeneSimmons.com". Gene Simmons. Retrieved 2010-10-30.
  42. ^ Adegoke, Yinka; Stempel, Jonathan (October 26, 2010). "Court shuts down LimeWire music-sharing service". Reuters. Retrieved October 26, 2010.
  43. ^ Sandoval, Greg (October 26, 2010). "Judge slaps Lime Wire with permanent injunction". CNET. Retrieved October 26, 2010.
  44. ^ Chris Morris (2010-10-29). "The Shared Enemy of Hollywood, Gene Simmons and Hustler". CNBC.
  45. ^ Thomas Mennecke (2010-10-28). "Anonymous Planning DDoS Attack Against the RIAA". Slyck.com.
  46. ^ Mark Hachman (2010-10-28). "'Anonymous' Plans DDoS Attack on RIAA on Friday". PC Magazine.
  47. ^ Thomas Mennecke (2010-10-29). "RIAA and LimeWire Both are Offline". Slyck.com.
  48. ^ Mark Hachman (2010-10-29). "'Anonymous' DDoS Attack Takes Down RIAA Site". PC Magazine.
  49. ^ Lucian Constantin (2010-11-01). "Anonymous Attacks RIAA over LimeWire Shutdown". Softpedia.
  50. ^ John Leyden (2010-11-01), RIAA and Anonymous sites both downed by DDoS assaults, The Register
  51. ^ Zeljika Zorz (2010-11-01). "RIAA's sites downed by Anonymous DDoS attack". net-security.org.
  52. ^ "Operation Payback takes a break… but for how long?". myce.com. 2010-11-09.
  53. ^ a b Greg Sandoval (2010-11-09). "FBI probes 4chan's 'Anonymous' DDoS attacks". CNET.com.
  54. ^ "Hackers take down website of bank that froze WikiLeaks funds". Retrieved 7 December 2010.
  55. ^ "WikiLeaks US embassy cables: live updates". Retrieved 7 December 2010.
  56. ^ "PayPal, PostFinance Hit by DoS Attacks, Counter-Attack in Progress". Retrieved 7 December 2010.
  57. ^ http://www.businessinsider.com/cyber-hackers-that-took-down-swiss-bank-site-have-now-taken-down-mastercardcom-2010-12
  58. ^ Esther Addley and Josh Halliday (2010-12-09). "WikiLeaks supporters disrupt Visa and MasterCard sites in 'Operation Payback'". guardian.co.ul. The Guardian. {{cite web}}: Unknown parameter |acessdate= ignored (|access-date= suggested) (help)
  59. ^ Horn, Leslie (2010-12-08). "'Anonymous' Launches DDoS Attacks Against WikiLeaks Foes". pcmag.com. Retrieved 2010-12-09. {{cite web}}: Unknown parameter |publsiher= ignored (|publisher= suggested) (help)
  60. ^ Xeni Jardin (2010-12-08). "Continuing pro-WikiLeaks DDOS actions, Anonymous takes down PayPal.com". boingboing.net. Boing Boing. Retrieved 2010-12-09.
  61. ^ Muller, John (2010-12-08). "Updated Statement about WikiLeaks from PayPal General Counsel, John Muller". thepaypalblog.com. PayPal. Retrieved 2010-12-09.
  62. ^ Vasquez, Bertrand (2010-12-08). "PayPal Vows to Release WikiLeaks Funds, Account to Remain Blocked". erictric.com. Erictric. Retrieved 2010-12-09.
  63. ^ "Statement on DDOS attacks". wikileaks.ch. WikiLeaks. 2010-12-09. Retrieved 2010-12-09.
  64. ^ The CNN Wire Staff (2010-12-09). "Pro-WikiLeaks hackers change target to PayPal". edition.cnn.com. CNN. Retrieved 2010-12-09. {{cite web}}: |author= has generic name (help)
  65. ^ Cluley, Graham (2010-12-09). "Dutch boy arrested for WikiLeaks-related DDoS attacks on Mastercard and PayPal". nakedsecurity.sophos.com. Sophos. Retrieved 2010-12-09.
  66. ^ "16-jarige jongen aangehouden vanwege WikiLeaks-aanvallen". om.nl (in Dutch). 2010-12-09. Retrieved 2010-12-09.
  67. ^ a b c d Jake Tapper (2010-12-08). "Exclusive: Sarah Palin Under Cyber-Attack from Wikileaks Supporters in 'Operation Payback'". abcnews.com. ABC News. {{cite web}}: Unknown parameter |accesdate= ignored (|access-date= suggested) (help)
  68. ^ Phillips, Tom (2010-12-09). "Sarah Palin website hit by WikiLeaks Operation Payback DDoS attack". metro.co.uk. Metro. Retrieved 2010-12-09.
  69. ^ a b c Hudson, John (2010-12-09). "Is Palin Just Using 'Operation Payback' to Get Attention?". theatlanticwire.com. The Atlantic Wire. Retrieved 2010-12-09.
  70. ^ cmumusicnews (2010-11-01). "RIAA site goes down following LimeWire win". thecmuwebsite.com.
  71. ^ enigmax (2010-11-20). "Pirate Parties Use Influence to Halt Anonymous Operation Payback". torrentfreak.com. TorrentFreak.
  72. ^ "Facebook und Twitter gegen "Operation Payback"". heise.de (in German). 2010-12-08. Retrieved 2010-12-08.
  73. ^ "Operation Payback". knowyourmeme.com. Know Your Meme. 2010-12-08. Retrieved 2010-12-08.
  74. ^ "Facebook and Twitter Suspend Operation Payback Accounts". blogs.forbes.com. Forbes. 2010-12-08. Retrieved 2010-12-09.
  75. ^ Mills, Elinor (2010-12-08). "Facebook, Twitter boot WikiLeaks supporters after Visa attack". news.cnet.com. Cnet. {{cite web}}: Unknown parameter |acessdate= ignored (|access-date= suggested) (help)
  76. ^ "Noose Closes Around Pro-WikiLeaks Vigilantes". gawker.com. Valleywag. 2010-12-09. Retrieved 2010-12-09.
  77. ^ http://www.thetechherald.com/article.php/201049/6530/Anonymous-keeps-the-cannons-firing-while-pressure-mounts
  78. ^ a b c d e f Anonymous. "Operation Payback - Targets". anonops.net. Retrieved 2010-10-29.
  79. ^ Perez, Sarah (2010-12-09). "Operation Payback Targets Amazon; Wikileaks Cables Found in Kindle Book Store". readwriteweb.com. ReadWriteWeb. Retrieved 2010-12-09.
  80. ^ a b c Constantin, Lucian (2010-09-27). "Anonymous DDoS Tool Gets Botnet Capabilities". Softpedia. Retrieved 2010-10-22.
  81. ^ "Operation Payback flyer from mpaa.org attack". 2010-09-17. Retrieved 2010-10-29.
  82. ^ "backup IRC is: irc.anonops-irc.com". Official Operation Payback Twitter.