Anonymous Hackers Aim To Undermine Russia

Soon after Putin's invasion of Ukraine, Anonymous declared a cyber war on Russia and now the hacktivist collective has been bombarding Russia with cyber attacks on President Vladimir Putin in retaliation for the invasion of Ukraine.

The hacktivist collective has claimed responsibility for disabling government, corporate, and news websites and says it has taken down Russian websites and stolen government data.

One such incident was captured in a short video clip which shows normal programming interrupted with images of bombs exploding in Ukraine and soldiers talking about the horrors of the conflict. The exploit has the various hallmarks of an Anonymous hack, id dramatic, impactful and easy to share online and, like many of the group's other cyber attacks, it is extremely hard to verify. 

Hackers have mostly been using DDoS attacks, where a server is overwhelmed by a flood of requests.The hackers have justified their actions saying innocent Ukrainians were being massacred. 

Who Are Anonymous?

  • The hacktivist collective first emerged in 2003 from the website 4chan.
  • The group has no leadership, its motto is "We are legion".
  • Anyone can claim to be a part of the group and hack for any cause they want, but they generally they attack organisations accused of misusing power
  • Their symbol is a Guy Fawkes mask, made famous by Alan Moore's graphic novel V for Vendetta in which an anarchist revolutionary topples a corrupt fascist government.
  • The group has many social media accounts, with 15.5 million followers on its Twitter pages alone

Anonymous hackers have also defaced Russian websites, which involves gaining control of a website to change the content displayed. So far, the attacks have caused disruption and embarrassment, but cyber-experts have become increasingly concerned by the explosion of hacktivism since the invasion. They are legitimate concerns that that an Anonymous hacker might knock out a hospital's computer network or interrupt critical communication links accidentally.

Anonymous has not been this active in years. One example of a new recruit is  'Roman', is a Ukrainian tech entrepreneur who heads a group of hackers called 'Stand for Ukraine', had no links with the organisation until Russia invaded his country. Another group that has merged with Anonymous is a Polish hacking team called Squad 303, named after a famous Polish Royal Air Force fighter squadron in World War Two.

There have been three major waves of co-ordinated DDoS attacks against Ukraine since January, plus three incidents of more serious "wiper" attacks that deleted data on a small number of Ukrainian computer systems.

Twitter AnonTV:     Fortune:      BBC:      You Tube:       recents:    Daily Star:  

You Might Also Read:

Ukraine: Spam Website To Reach Millions Of Russians:

 

« Zelensky Deepfake Tells Ukrainians To ‘lay down arms’
The British Online Harms Bill Takes Shape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Certification Europe

Certification Europe

Certification Europe (now Amtivo Ireland) is an accredited certification body which provides ISO management system certification, including ISO 27001.

Exprivia

Exprivia

Exprivia is active in the design, development and integration of IT systems including cyber security.

Aviva

Aviva

Aviva provides Cyber Liability cover for small to mid-market customers to help combat the threat of data and privacy breach.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Charities Security Forum (CSF)

Charities Security Forum (CSF)

The Charities Security Forum is the premier membership group for information security people working for charities and not-for-profits in the UK.

Salt Cybersecurity

Salt Cybersecurity

Salt Cybersecurity offer a four-pronged approach to information security that includes Custom Security Policy, Vulnerability Assessment, Threat Detection, and Security Awareness Training.

Sharktech

Sharktech

Sharktech designs, develops, and supports advanced DDoS protection and web technologies.

ProofID

ProofID

ProofID is a specialist provider of Identity Access Management (IAM) solutions. We focus on the solving the complex needs of the modern enterprise.

Mitigate Cyber

Mitigate Cyber

Mitigate Cyber (formerly Xyone Cyber Security) offer a range of cyber security solutions, from threat mitigation to penetration testing, training & much more.

Darknone Global

Darknone Global

Darknone is a consortium of elite hackers and security leaders united by an unbridled passion for augmenting the security of the digital realm.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

Thunder Shield Security

Thunder Shield Security

Thunder Shield is a professional cyber security service provider of penetration test, source code review and security assessment services.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.

CelcomDigi

CelcomDigi

CelcomDigi aspire to be Malaysia’s top Telco-Tech company, transforming beyond core connectivity to lead digitalization and innovation as part of nation-building.