How Is Anonymous Going After The French Co. Trying To Trademark Its Logo? Let Us Count The Ways

Hey, you stepped in it, man, don't be surprised if it sticks.

No, seriously, you should expect this.

Earlier we learned a French retailer, E-Flicker, has sought to register both Anonymous’s well-known question-mark/empty suit logo and the activist collective’s tagline, “We are anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

Sign Up For Our Daily Newsletter

By clicking submit, you agree to our <a rel="noreferrer" href="">terms of service</a> and acknowledge we may use your information to send you emails, product samples, and promotions on this website and other properties. You can opt out anytime.

See all of our newsletters

Anonymous responded with the video below but in poking around we found a few pages intended to assist Anons in their next move against E-Flicker. One examined server vulnerabilities behind one of the company’s websites and the paster’s conclusion is that E-Flicker, in trying to monetize Anonymous–in the collective’s words, make it “the whore of the world”–is vulnerable to at least one particular kind of hack attack:

The URL: is vulnerable to cross site request forgery. It allows the attacker to exchange the method from POST to GET when sending data to the server.

“Cross site request” forgeries can, in the words of CodingHorror blogger Jeff Atwood, let attackers “initiate any arbitrary action they like on a target website.”

A deeper look at recent Pastebin posts indicates Anons–or those sympathetic to Anonymous–are digging up other vulnerabilities as well. One page purports to identify SQL injection vulnerabilities for An SQL injection can give a hacker the ability to attack databases and glean fun stuff like credit card numbers and user passwords.

A third Pastebin page appears to offer code meant to assist a HOIC DDoS attack on and related subdomains. The High Orbit Ion Cannon is a different flavor of the Anon-beloved LOIC (Low Orbit Ion Cannon). reported in January that HOIC makes it hard for a targeted website to determine if it is actually being DDoSed or not, using “randomization techniques” to “evade detection.”

But a wrathful Anonymous may not stop with cross site request forgeries, SQL injections or the tried and true DDoS attack. E-Flicker head Apollinaire Auffret has already been “doxed”–his personal info including phone numbers and email addresses published for all to see–in multiple locations on Pastebin and elsewhere.

Mr. Auffret, it goes without saying, should have expected this.


via Anonymous: Operation AnonTrademark [english] – YouTube.

How Is Anonymous Going After The French Co. Trying To Trademark Its Logo? Let Us Count The Ways