Operation Payback was a coordinated,[1] decentralized[2] group of attacks on high-profile[3] opponents ofInternet piracy byInternet activists using the "Anonymous" moniker. Operation Payback started as retaliation todistributed denial of service (DDoS) attacks ontorrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. TheMotion Picture Association of America, thePirate Party UK andUnited States Pirate Party criticised the attacks.
Following theUnited States diplomatic cables leak in December 2010, the organizers commenced DDoS attacks on websites of banks who had withdrawn banking facilities fromWikiLeaks.

In 2010, severalBollywood companies hired Aiplex Software to launch DDoS attacks on websites that did not respond totakedown notices.[4][5] Piracy activists then created Operation Payback in September 2010 in retaliation.[4] The original plan was to attack Aiplex Software directly, but upon finding some hours before the planned DDoS that another individual had taken down the firm's website on their own, Operation Payback moved to launching attacks against the websites of copyright stringent organisationsMotion Picture Association of America (MPAA) andInternational Federation of the Phonographic Industry, giving the two websites a combined total downtime of 30 hours.[6][7] In the following two days, Operation Payback attacked a multitude of sites affiliated with the MPAA, theRecording Industry Association of America (RIAA),[8] andBritish Phonographic Industry.[4] Law firms such asACS:Law,Davenport Lyons and Dunlap, Grubb & Weaver (of theUS Copyright Group) were also attacked.[9][10][11][12]
On September 21, 2010, the website of United Kingdom law firmACS:Law was subjected to a DDoS attack as part of Operation Payback. When asked about the attacks, Andrew Crossley, owner of ACS:Law, said: "It was only down for a few hours. I have far more concern over the fact of my train turning up 10 minutes late or having to queue for a coffee than them wasting my time with this sort of rubbish."[9][11]
When the site came back online a 350MB file, which was a backup of the site, was visible to anyone for a short period of time.[13] The backup, which included copies of emails sent by the firm, was downloaded and made available on variouspeer-to-peer networks and websites includingThe Pirate Bay.[13][14][15] Some of the emails contained unencryptedExcel spreadsheets, listing the names and addresses of people that ACS:Law had accused of illegally sharing media. One contained more than 5,300Sky broadband customers whom they had accused of illegally sharingpornography,[16][17] while another contained the details of 8,000 Sky customers and 400Plusnet customers accused of infringing the copyright on music by sharing it onpeer-to-peer networks.[18] This alleged breach of theData Protection Act has become part of the ongoing investigation into ACS:Law by theInformation Commissioner's Office.[19][20]
On September 30, theLeesburg, Virginia office of Dunlap, Grubb & Weaver law firm – also doing business as the "U.S. Copyright Group"[21] – was evacuated by the police after an emailed bomb threat was received.[22][23] It's believed the event could be connected to Anonymous.[24] Non-related copyright or law firms sites, such as websheriff.com,[12] were also attacked. These attacks were originally organized through anInternet Relay Chat channel.[4] The attacks also became a popular topic onTwitter.[4]
On September 27, 2010, the DDoS attack on theAustralian Federation Against Copyright Theft (AFACT) unintentionally brought down 8,000 other small websites hosted on the same server.[25]
In September 2010, in an attempt to ensure thatPortuguese citizens could not accessthepiratebay.org, Associação do Comércio Audiovisual de Portugal (ACAPOR) filed a complaint againstThe Pirate Bay. The complaint was filed with the General Inspection of Cultural Activities, which is part of thePortuguese Ministry of Culture. According to the movie rental association, The Pirate Bay is directly responsible for about 15 million illegal downloads in Portugal every year. By installing a Pirate Bay block on allISPs, ACAPOR hoped to decrease the financial damage it claims The Pirate Bay causes.[26]
On October 18, 2010, the ACAPOR website wasdefaced, presenting text from Operation Payback and a redirect to The Pirate Bay after a few seconds. In addition to defacing the website, a copy of the email database of ACAPOR was uploaded to The Pirate Bay.[27][28] The leaked e-mails so far revealed ACAPOR's methods of denunciation, its dissatisfaction with the Portuguese government and justice system,[29] its perception of the copyright debate as war, and its antagonism with the ISPs. ACAPOR claimed that "the business of ISPs is illegal downloading."[30]
On October 4, 2010, Operation Payback launched an attack on theMinistry of Sound website and the Gallant Macmillan website.[31]
On October 7, 2010, they attacked the website of the Spanish copyright society, sgae.es.[32] As of October 7, 2010, the total downtime for all websites attacked during Operation Payback was 537.55 hours.[7]
On October 15, 2010, Copyprotected.com wasSQL injected and defaced,[7][33] and three days later Operation Payback launched a DDoS attack against theUK Intellectual Property Office.[34]
Production companies SatelFilm.at and Wega-Film.at were hit by "drive-by" DDoSes on October 21, 2010, in response to their efforts to gain a court injunction against anISP that refused to block a movie-streaming website,[35] Operation Payback then knocked porn websiteHustler.com offline the following day.[36]
During the 2010MIPCOM convention,Gene Simmons ofKiss stated:
Make sure your brand is protected... Make sure there are no incursions. Be litigious. Sue everybody. Take their homes, their cars. Don't let anybody cross that line.[37]
— Gene Simmons
In response to Simmons' comments,[38] members of Operation Payback switched their attentions to his two websites,SimmonsRecords.com andGeneSimmons.com, taking them both offline for a total of 38 hours.[7][39] At some point during the course of this DDoS,GeneSimmons.com was hacked and redirected toThePirateBay.org.[40] In response to the attack Simmons wrote:
Some of you may have heard a few popcorn farts re: our sites being threatened by hackers.
Our legal team and the FBI have been on the case and we have found a few, shall we say "adventurous" young people, who feel they are above the law.
And, as stated in my MIPCOM speech, we will sue their pants off.
First, they will be punished.
Second, they might find their little butts in jail, right next to someone who's been there for years and is looking for a new girl friend.
We will soon be printing their names and pictures.
We will find you.
You cannot hide.
Stay tuned[41]
This led to additional attacks and subsequently more downtime for his websites.[41][42][43][44] Later, Simmons's message was removed from his website.[45] More than one year later, in December 2011, a person supposedly known under the nickname "spydr101" was arrested in relation to the attack against GeneSimmons.com. He was charged with conspiracy and unauthorized impairment of a protected computer.[46][47][48]
On October 26, 2010,LimeWire was ordered to disable the "searching, downloading, uploading, file trading and/or file distribution functionality" after losing a court battle with theRIAA over claims of copyright infringement. Not satisfied with the injunction, the RIAA announced its intention to continue theArista Records LLC v. Lime Group LLC trial to recover damages caused by the program.[49][50] In retaliation,[51] members of Operation Payback announced that they would attack RIAA's website on October 29, despite the fact that the group typically does not hit the same target twice.[52][53] On October 29,riaa.org indeed was taken offline viadenial-of-service attack.[54][55] After the attack,riaa.com andriaa.org sites were inaccessible in Europe.[56] Operation Payback's main site was attacked later that day, and they subsequently moved their website fromtieve.tk toanonops.net.[57][58]
During the damages phase of the LimeWire trial, the RIAA attempted to switch from seeking statutory damages per-work to seeking them per-infringement, but did not quote a total damage amount, nor a method of calculating the number of infringements.[59] The judge in the case rejected the proposal, holding that case law only supported statutory damages on a per-work basis for large-scale infringement, thus capping the potential award at $1.5 billion.[59] On March 15, 2011, four days after the ruling, a report appeared on Law.com highlighting the judge's remark that the per-infringement award sought by the record companies might total in the "trillions"; the report estimated $75 trillion in its attention-grabbing headline (USA'snominal GDP in 2012-2013 was about $16–17 trillion).[60] This figure was repeated inPC Magazine on March 23.[61] An Operation Payback call-to-arms followed, citing the $75 trillion figure as if it were still being actively sought by the RIAA, and a DDoS attack on the RIAA website commenced on March 25.[62]
Around October 28, 2010, the group set up a new website with the intention of coordinating protests around the world to raise awareness of their cause. The date for the protest activities were on November 5, the intended day of theGunpowder Plot, with which Anonymous heavily affiliates through its use ofGuy Fawkes masks.
The protest activity included an attack on theUnited States Copyright Office, after which theFBI launched an investigation.[63] They later arrested one person accused of taking part in the attack onPayPal.[64]
On November 9, 2010, Operation Payback temporarily ceased attacking websites.[65] The hiatus lasted about four months, ending with an early March 2011 attack that temporarily took down the website ofBMI, a prominent collection society operating on behalf of music publishers.[66] This was followed by the aforementioned second attack on the RIAA website.
On December 8, 2010, U.S. politicianSarah Palin announced that her website and personal credit card information were compromised.[67] Palin's team believed the attack was executed by Anonymous, though Anonymous never commented about Palin as a possible target for any attack.[67][68][69] Palin's technical team posted a screenshot of a server log file showing the wikileaks.orgURL.[67][69] Visa attacks had been denial of service attacks, but credit card data was not compromised. It is unknown whether Palin's card was compromised as part of a broad attack on Visa or a specific attack on the Palins.[69]
In December 2010,WikiLeaks came under intense pressure to stop publishing secret U.S. diplomatic cables. Corporations such asAmazon,PayPal,BankAmerica, Swiss bankPostFinance,MasterCard andVisa either stopped working with or froze their customers' donations to WikiLeaks due to political pressures. In response, those behind Operation Payback directed their activities against these companies.[70][71] Operation Payback launched DDoS attacks against PayPal, PostFinance and theSwedish Prosecution Authority.[72][73][74] On December 8, 2010, a coordinated DDoS attack by Operation Payback brought down both the MasterCard and Visa websites.[75][76][77][78] On December 9, 2010, prior to a sustained DDoS attack on the PayPal website that caused a minor slowdown to its service, PayPal announced on its blog that it would release the frozen funds in the account of theWau Holland Foundation that was raising funds for WikiLeaks, but would not reactivate the account.[79][80] Regarding the attacks, WikiLeaks spokesman Kristinn Hrafnsson denied any relation to the group and said, "We neither condemn nor applaud these attacks. We believe they are a reflection of public opinion on the actions of the targets."[81] On the same day, a 16-year-old boy was arrested inThe Hague,Netherlands, in connection with the distributed denial-of-service attacks against MasterCard and PayPal.[82][83][84] The boy was an IRC operator under the nickname of Jeroenz0r.[85]
On December 10, 2010,The Daily Telegraph reported that Anonymous had threatened to disrupt British government websites if Assange were extradited to Sweden.[86] Anonymous issued apress release[87] in an attempt to clarify the issue.[88]
Electronic Frontier Foundation co-founderJohn Perry Barlow described the attacks as "theshot heard round the world—this isLexington."[89] On December 13, 2010Julian Assange called for supporters to protect WikiLeaks and said that "Visa, Mastercard, PayPal and others are instruments of US foreign policy" in a statement that was seen as likely to add cyber attacks being perpetrated by Anonymous in support of WikiLeaks.[90]
The following is a list of sites and domains known to have been targeted:
| Target | Site | Attack time | Ref. |
|---|---|---|---|
| PostFinance | postfinance.ch | 2010-12-06 | [72] |
| Swedish Prosecution Authority | aklagare.se | 2010-12-07 | [91] |
| EveryDNS | everydns.com | 2010-12-07 | [70] |
| Joseph Lieberman | lieberman.senate.gov | 2010-12-08 | [92] |
| MasterCard | mastercard.com | 2010-12-08 | [93] |
| Borgstrom andBodström | advbyra.se | 2010-12-08 | [92] |
| Visa | visa.com | 2010-12-08 | [94] |
| Sarah Palin | sarahpac.com | 2010-12-08 | [67] |
| PayPal | thepaypalblog.com | 2010-12-09 | [95] |
| Amazon | amazon.com | 2010-12-09 (Aborted) | [96] [97] |
| PayPal | api.paypal.com:443 | 2010-12-10 | [98] |
| MoneyBookers | moneybookers.com | 2010-12-10 | [99] |
| Conservatives4Palin | conservatives4palin.com | 2010-12-10 | [100] |
Operation Payback's attempt to take down Amazon.com was aborted after they failed to recruit enough users to their botnet; CNN noted that the massive Amazon website "is almost impossible to crash."[96]
In late December, the FBI began to raid suspected participants in Operation Payback.[101]
At the beginning of 2011, Operation Payback brought downZimbabwean government websites after the ZimbabweanPresident'swife sued a newspaper for $15 million for publishing a WikiLeaks cable that linked her with the alleged trade inillicit diamonds.[102] On January 27, 2011, five males aged between 15 and 26 were arrested in early morning raids in the U.K. on suspicion of involvement,[103] and the FBI executed 40 search warrants the same day.[104]
TheUnited Kingdom Intellectual Property Office said that when its site was attacked, those responsible were depriving its citizens of access to information they have a democratic right to access.[105] Other critics claimed the attacks restricted Gene Simmons' right to free speech.[105]
A spokesman for the MPAA said, "It's troubling that these groups seem more concerned about the rights of those who steal and copy films, music, books, and other creative resources than the rights of American workers who are producing these products."[63]
There was also some criticism from thePirate Party UK andUnited States Pirate Party, which in a joint public statement urged the group to "Immediately cease the Distributed Denial-of-Service (DDoS) attacks and to instead seek out a legal method to express your frustration and disquiet with the copyright industry, and their perversions of copyright law for personal gain."[106]
While acknowledging that the DDoS attacks on credit card and banking web sites serve as political protests, cyber experts said that Operation Payback has not done any long-term damage: most sites are back online, and people are still continuing to use their credit cards to make payments. "This is more like a noisy political demonstration, like a mob surrounding a bank and refusing to let anyone in or out" said one cyber expert.[107]
Operation Payback members used a modified version of theLow Orbit Ion Cannon (LOIC) to execute the DDoS attacks.[108] In September 2010, a "Hive Mind" mode was added to the LOIC.[108] While in Hive Mind mode, the LOIC connects toIRC, where it can be controlled remotely. This allows computers with LOIC installed on them to behave as if they were a part of abotnet. Utilising this tool, the coordinators of Operation Payback were able to quickly take down websites belonging to anti-piracy groups.[108] Botnets of all sizes have also been used.[109]
Members of Operation Payback reportedly used an IRC channel to communicate about which targets to select, after which instructions for attacking the targets were produced and posted on variousimageboards (4chan/7chan/711chan/420chan/808chan).[110] Media such asTwitter andFacebook were also utilized for coordination,[110] but on December 8, 2010, Operation Payback's Facebook page was removed and its official Twitter account was suspended.[94][111][112] Additionally a federal court order forcedEncyclopedia Dramatica to delete its Operation Payback article, which featured a detailed history of the operation, including personal information of some individuals associated with the companies attacked.[113][114][115]
In July 2011, 14 members of Operation Avenge Assange were arrested.[116] In October 2013, 13 members of Operation Payback were indicted in Federal court inAlexandria, Virginia as co-conspirators in violation of18 U.S.C. § 371 and18 U.S.C. § 1030.[117] In 2014, some of the members received a plea deal, reducing their felony charges to a single misdemeanor.[118] The defendants were penalized with jail sentences. One defendant, who was represented byMarina Medvin, the same lawyer who later defendedJanuary 6 Capitol Attack cases, was penalized with only 75 hours of community service.[119]
{{cite news}}:|author= has generic name (help)