DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Has MEGA Failed Already, Exposed, Site Unstable and Twitter hacked!

Posted on January 22, 2013 by Lee J

mega Kim dot com announced his new file sharing service MEGA (https://mega.co.nz/) on this week and ever since it has been trouble for him it seems. With constant questions about its TOS and privacy as well as the site being "flooded by users" within its opening hours and now the twitter account has been breached. Last night it all started with complaints of the site being inaccessible due to time outs and i even questioned this with a simple stuck up response of "use a real browser"(see below for screen cap) from kim dot com. since then heaps of people have been complaining about it and it appears that MEGA just was not ready for the amount of traffic that came which suggests that no server testing was done. > The massive global PR around the #Mega launch is simply to big to handle for our start-up. I apologize for poor service quality — Kim Dotcom (@KimDotcom) January 21, 2013

Also last night a user who account is now suspended @CouncilOfZues tweeted at us claiming the site was being attacked. asdad Today it appears that some one has taken control of the @MEGAdotCo twitter account and is retweeting its fail announcements from other users maximum-stirner-megadotco-on-twitter Also @YourAnonNews has been calling for a boycott of MEGA and its services due to a trust issue with Kim and his previous dealings with anti-piracy groups after an article on wired has been brought back into the public eye as a reminder. > Wired: .@kimdotcom "Assisted U.S. Prosecution of Smaller File-Sharing Service."bit.ly/VlBxCi #MEGA — Anonymous (@YourAnonNews) January 22, 2013

In solidarity with NinjaVideo pirates rotting in jail after @kimdotcom snitched them out to DHS, we call for a boycott of all #MEGA services — Anonymous (@YourAnonNews) January 22, 2013

Last year Anonymous was behind a very strong operation that was in the name of MegaUpload, OpMegaUpload so i guess this may be the start to OpMegaUpload2 but this time against them and not for them. So is MEGA really safe or is this all a media stunt to get attention? below is some further reading so you can make up your own mind. – https://www.zdnet.com/mega-users-if-youre-hacked-once-youre-hacked-for-life-7000010054/

  • https://www.wired.com/threatlevel/2012/11/megaupload-investigation-roots/
  • https://anonymousnews.blogs.ru/2013/01/21/dotcom%E2%80%99s-mega-anti-piracy-group-moves-to-cut-off-site%E2%80%99s-finances/
  • https://www.forbes.com/sites/andygreenberg/2013/01/21/researchers-warn-megas-new-encrypted-cloud-cant-keep-its-megasecurity-promises/
  • https://arstechnica.com/business/2013/01/megabad-a-quick-look-at-the-state-of-megas-encryption/
  • https://gizmodo.com/5977674/one-important-way-mega-is-more-law+proof-than-megaupload
Category: Breach Incidents

Post navigation

← Lucile Packard Children’s Hospital at Stanford notifying 57,000 patients after laptop stolen from physician's car
Trinity Broadcasting Network Hacked, Affiliate Credentials Leaked →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024 (2)
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.