Anonymous Hackers Aim To Undermine Russia

Soon after Putin's invasion of Ukraine, Anonymous declared a cyber war on Russia and now the hacktivist collective has been bombarding Russia with cyber attacks on President Vladimir Putin in retaliation for the invasion of Ukraine.

The hacktivist collective has claimed responsibility for disabling government, corporate, and news websites and says it has taken down Russian websites and stolen government data.

One such incident was captured in a short video clip which shows normal programming interrupted with images of bombs exploding in Ukraine and soldiers talking about the horrors of the conflict. The exploit has the various hallmarks of an Anonymous hack, id dramatic, impactful and easy to share online and, like many of the group's other cyber attacks, it is extremely hard to verify. 

Hackers have mostly been using DDoS attacks, where a server is overwhelmed by a flood of requests.The hackers have justified their actions saying innocent Ukrainians were being massacred. 

Who Are Anonymous?

  • The hacktivist collective first emerged in 2003 from the website 4chan.
  • The group has no leadership, its motto is "We are legion".
  • Anyone can claim to be a part of the group and hack for any cause they want, but they generally they attack organisations accused of misusing power
  • Their symbol is a Guy Fawkes mask, made famous by Alan Moore's graphic novel V for Vendetta in which an anarchist revolutionary topples a corrupt fascist government.
  • The group has many social media accounts, with 15.5 million followers on its Twitter pages alone

Anonymous hackers have also defaced Russian websites, which involves gaining control of a website to change the content displayed. So far, the attacks have caused disruption and embarrassment, but cyber-experts have become increasingly concerned by the explosion of hacktivism since the invasion. They are legitimate concerns that that an Anonymous hacker might knock out a hospital's computer network or interrupt critical communication links accidentally.

Anonymous has not been this active in years. One example of a new recruit is  'Roman', is a Ukrainian tech entrepreneur who heads a group of hackers called 'Stand for Ukraine', had no links with the organisation until Russia invaded his country. Another group that has merged with Anonymous is a Polish hacking team called Squad 303, named after a famous Polish Royal Air Force fighter squadron in World War Two.

There have been three major waves of co-ordinated DDoS attacks against Ukraine since January, plus three incidents of more serious "wiper" attacks that deleted data on a small number of Ukrainian computer systems.

Twitter AnonTV:     Fortune:      BBC:      You Tube:       recents:    Daily Star:  

You Might Also Read:

Ukraine: Spam Website To Reach Millions Of Russians:

 

« Zelensky Deepfake Tells Ukrainians To ‘lay down arms’
The British Online Harms Bill Takes Shape »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Akin Gump Strauss Hauer & Feld

Akin Gump Strauss Hauer & Feld

Akin is a leading global law firm providing innovative legal services and business solutions to individuals and institutions. Practice areas include Cybersecurity, Privacy and Data Protection.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Sliced Tech

Sliced Tech

Sliced Tech provides enterprise grade managed Cloud services, including Security-as-a-Services, aimed at meeting the needs of commercial and government clients from within Australia.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

CipherTrace

CipherTrace

CipherTrace develops cryptocurrency Anti-Money Laundering, cryptocurrency forensics, and blockchain threat intelligence solutions.

Brimondo

Brimondo

At Brimondo we help you to maximize and protect your brand value by being a proactive and strategic partner within brand protection with experts within intellectual property and digital assets.

CyberEdBoard

CyberEdBoard

CyberEdBoard is a private, peer-to-peer education and networking community focused on cybersecurity, technology, business processes and risk management.

TrustGrid

TrustGrid

Trustgrid is a pioneer and leader in secure, cloud-native software-defined connectivity.

UncommonX

UncommonX

UncommonX offers enterprise-class cybersecurity protection for mid-size organizations by combining adaptive threat and intelligence software with 24/7 industry experts.

LoughTec

LoughTec

LoughTec secure, manage and connect IT infrastructure for businesses and organisations throughout the UK and Republic of Ireland.

Bright Security

Bright Security

Bright Security is a developer-centric Dynamic Application Security Testing (DAST) solution that helps organizations ship secure applications and APIs quickly and cost-effectively.

CSIOS Corp.

CSIOS Corp.

At CSIOS we help our customers achieve and sustain information and cyberspace superiority through a full range of defensive and offensive cyberspace operations and cybersecurity consulting services.

Truly Secure

Truly Secure

Truly Secure is an IT Service Provider that ensures greater efficiency and security within a company's technological environment.

TuxCare

TuxCare

TuxCare make Linux more secure. We take care of Linux so that organizations can use Linux to support environments that require high levels of Cybersecurity, stability, and availability.

Ventum Consulting

Ventum Consulting

Ventum Consulting stands for digitalization, networking and agilization. We take this up on the strategic, professional and technical side and support our customers in the digital transformation.