Anonymous Hackers Aim To Undermine Russia

Soon after Putin's invasion of Ukraine, Anonymous declared a cyber war on Russia and now the hacktivist collective has been bombarding Russia with cyber attacks on President Vladimir Putin in retaliation for the invasion of Ukraine.

The hacktivist collective has claimed responsibility for disabling government, corporate, and news websites and says it has taken down Russian websites and stolen government data.

One such incident was captured in a short video clip which shows normal programming interrupted with images of bombs exploding in Ukraine and soldiers talking about the horrors of the conflict. The exploit has the various hallmarks of an Anonymous hack, id dramatic, impactful and easy to share online and, like many of the group's other cyber attacks, it is extremely hard to verify. 

Hackers have mostly been using DDoS attacks, where a server is overwhelmed by a flood of requests.The hackers have justified their actions saying innocent Ukrainians were being massacred. 

Who Are Anonymous?

  • The hacktivist collective first emerged in 2003 from the website 4chan.
  • The group has no leadership, its motto is "We are legion".
  • Anyone can claim to be a part of the group and hack for any cause they want, but they generally they attack organisations accused of misusing power
  • Their symbol is a Guy Fawkes mask, made famous by Alan Moore's graphic novel V for Vendetta in which an anarchist revolutionary topples a corrupt fascist government.
  • The group has many social media accounts, with 15.5 million followers on its Twitter pages alone

Anonymous hackers have also defaced Russian websites, which involves gaining control of a website to change the content displayed. So far, the attacks have caused disruption and embarrassment, but cyber-experts have become increasingly concerned by the explosion of hacktivism since the invasion. They are legitimate concerns that that an Anonymous hacker might knock out a hospital's computer network or interrupt critical communication links accidentally.

Anonymous has not been this active in years. One example of a new recruit is  'Roman', is a Ukrainian tech entrepreneur who heads a group of hackers called 'Stand for Ukraine', had no links with the organisation until Russia invaded his country. Another group that has merged with Anonymous is a Polish hacking team called Squad 303, named after a famous Polish Royal Air Force fighter squadron in World War Two.

There have been three major waves of co-ordinated DDoS attacks against Ukraine since January, plus three incidents of more serious "wiper" attacks that deleted data on a small number of Ukrainian computer systems.

Twitter AnonTV:     Fortune:      BBC:      You Tube:       recents:    Daily Star:  

You Might Also Read:

Ukraine: Spam Website To Reach Millions Of Russians:

 

« Zelensky Deepfake Tells Ukrainians To ‘lay down arms’
The British Online Harms Bill Takes Shape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Gigamon

Gigamon

Gigamon provides intelligent Traffic Visability solutions that provide unmatched visbility into physical & birtual networks without affecting the performance or stability of production environments.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

I-Tracing

I-Tracing

I-TRACING are experts in IT security, specialized in legal compliance of information systems, security of information systems, and the collection of digital evidence and traces.

Bufferzone Security

Bufferzone Security

Bufferzone is a patented containment solution that defends endpoints against advanced malware and zero-day attacks while maximizing user and IT productivity.

Intrinsyc Technologies

Intrinsyc Technologies

Intrinsyc provides product development services and Edge Computing modules that are helping to take the Internet of Things products to the next level.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

David Hayes-Export Controls

David Hayes-Export Controls

David Hayes-Export Controls provides assistance to companies affected by export controls or who are considering entering the market but are unsure of the commercial and regulatory implications.

Towerwall

Towerwall

Towerwall offers a comprehensive suite of security services and solutions using best-of-breed tools and information security services.

Phriendly Phishing

Phriendly Phishing

Phriendly Phishing offers phishing awareness training programs designed to ward off potential security threats and minimise the impact of cyber attacks.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

MARS Suite

MARS Suite

MARS Suite is your all-in-one solution for cyber protection & compliance. Cybersecurity and risk management is what we do best. And we’re making it simple and easy.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.