• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 

News Flodrix botnet targets vulnerable Langflow servers

 | 

U.S. CISA adds Apple products, and TP-Link routers flaws to its Known Exploited Vulnerabilities catalog

 | 

Attackers target Zyxel RCE vulnerability CVE-2023-28771

 | 

India-based car-sharing company Zoomcar suffered a data breach impacting 8.4M users

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Laws and regulations
  • Megaupload files deleted by LeaseWeb

Megaupload files deleted by LeaseWeb

Pierluigi Paganini June 20, 2013

Megaupload files have been deleted by Dutch hosting provider LeaseWeb,  in the post a resume of the facts and fantastic hypothesis (maybe) on a strange case.

Megaupload files have been deleted by LeaseWeb, a Dutch hosting provider, without notice, the news is shocking if we consider the wealth of information contained in the files. LeaseWeb is based in Germany and has subsidiaries also in the United States, the company. Megaupload founder, Kim Dotcom, is shocked, he commented the event with a meaningful statement

“The greatest massacre data of history”

MegaUpload KimDotcom Twitter

Megaupload was the biggest file-sharing site, its main fault is to have harmed the interests of too many companies worldwide proposing offering a platform for free sharing that were shut down by the United States Department of Justice on 19 January 2012, following the indictment and arrests of the owners for allegedly operating as an organization dedicated to copyright infringement.

“Prosecutors accuse them of racketeering by facilitating massive copyright fraud. Dotcom says he’s innocent and can’t be held responsible for those who chose to use Megaupload to illegally download songs or movies.”

In this day are circulating images of the raid of law enforcement for the arrest of Kim Dotcom, it is evident the use of disproportionate means to stop a man who I would not have escaped the police, but the images are disturbing, a full-scale raid reminiscent of military operations views on the occasion of the capture of dangerous fugitives or terrorists.

 

Is Kim Dotcom a fugitive? Is he a terrorist? Why all this fury?

LeaseWeb is a Dutch hosting provider with centers in Germany and subsidiaries in the United States. The company has wiped all the files of Megaupload stored on its servers “without notice”. The event is not a fortuity, but it is a premeditated action that raises many doubts especially if we consider that there is a process ongoing.

Imagine that in a process the authorities destroy the body of proof, it makes no sense in an ideal world. Personally I believe that this file has been backuped several times before the cancellation, the questions are …

Who keeps these copies? What is contained in those files?

LeaseWeb announced Thursday it had deleted all Megaupload files from 630 servers, curious that it declared that maintained the data for over a year without receiving any requests to retain it, the affirmation is in contradiction to what declared by Dotcom that said through Twitter that his lawyers repeatedly requested LeaseWeb to keep the data pending U.S. Court proceedings.

“Megaupload and EFF sent robust data preservation demands to Leaseweb to maintain all user data during the pendency of the”

 MegaUpload KimDotcom Twitter 2

 

The FBI seized all Dotcom’s data and according the founder of Megaupload it hasn’t given him a copy yet. Some Megaupload files remain stored on U.S. servers, we hope they are treated with greater respect and justice take its course.

The fury of the authorities against Dotcom is really abnormal, even the behavior of the hosting provider is suspect, just that with LeaseWeb Megaupload had gained so much.

I leave you with a thought provoking … What if in that mountain of files there was hidden also some confidential U.S. Government documents?

Is it possible that KimDotcom knows an inconvenient truth and that Us government is trying to scare him?

What if Megaupload was used a for other reasons?

Steganography, intelligence, state-sponsored hackers … Are all familiar words, today all security experts are aware that compromising a wide audience service it is possible to attack a huge quantity of users. What else is Megaupload was used for watering hole attacks, or to spread a malicious agent, and the proof are hidden in the destroyed documents?

Cool … I can use it in my next book.

Do you think I’m paranoid? … Prism case should be an example, and it is only the tip of the iceberg.

Pierluigi Paganini

(Security Affairs – Megaupload, Kim Dotcom)


facebook linkedin twitter

copyright FBI file sharing Kim Dotcom Kim Schwartz LeaseWeb Megaupload

you might also like

Pierluigi Paganini May 19, 2025
Japan passed a law allowing preemptive offensive cyber actions
Read more
Pierluigi Paganini May 19, 2025
James Comey is under investigation by Secret Service for a seashell photo showing “8647”
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

    Cyber warfare / June 23, 2025

    Qilin ransomware gang now offers a "Call Lawyer" feature to pressure victims

    Breaking News / June 22, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

    Breaking News / June 22, 2025

    Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / June 22, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT