I think you should draw your own more informed conclusions, but it smells a lot like feds to me.
The breach happened over a week before the DDoS attack, according to Troy Hunt.
Stop looking for conspiracy theories.
This isn't something that commonly known (even judging by comments here) but in the publicly viewable metadata of every upload it contains the uploader's IA account email address. So from a security perspective it's bad but from a privacy perspective a lot of users probably weren't aware of this detail if they've uploaded anything.
Theoretically, someone could scrape the pages and compile a list of exposed email addresses.
How this specific instance unfolded, time will have to tell. The leak may have occurred in 2020 for all we know at this point
When not used for extortion and for "status" in the hacking community, they share them with researchers (commonly HIBP) to warn people about a site's security and so that site is forced to fix things.
Definitely a strange dynamic.
https://www.bleepingcomputer.com/news/security/internet-arch...
Many malware hijack search settings. However, very few hijack default browsers themselves these days. In the past (10 years ago) it was much more common.
Furthermore, I don't know of many malware that touch the .PDF file extension associations, and there are plenty of other associations that would be better to hijack.
Feels more like a sloppy fix to comply with EU's DMA.
https://www.theverge.com/2021/9/13/22671182/mozilla-default-...