Cyberwarfare is Common in Russia

B79D67F9-DF57-4DD4-88D6-0DB2ADA41D10_cx0_cy9_cw0_mw1024_s_n_r1.jpgAlleged Notorious Hacker Sergei Maksimov 

Over the years, Hacker Hell has broken into the Twitter Inc and email accounts of prominent opposition leaders and bloggers. In Russia, the government controls traditional media. And President Vladimir Putin's aides run a troll factory in St. Petersburg to compromise, expose, and even hurt Putin's enemies. So, hacks, data theft, and other forms of cyberwarfare are common in Russia.

The court trials have been extended and so Sergei Maksimov is yet to be proved guilty. Whether or not Hacker Hell was working for the Kremlin, the case offers a sneak peek into Russia's heating internal cyberwarfare. Hacker Hell twice hacked the email and Twitter accounts of opposition leader Alexei Navalny. He created a lot of enemies in the process of hacking popular bloggers and politicians.

Eventually, two journalists traced Hacker Hell down as Sergei Maksimov, a Russian who moved to Germany in 1997, reports Newsweek. When police came with a search warrant to Maksimov’s house upon being persuaded by Navalny, they found a document called "Gospel According to Hell," a notebook signed with "Hell", among other things.
Hackers are fighting back government-sponsored Trolls in Russia

The Kremlin may have an army of its own hackers, but some hackers have started fighting back. For over a year, a hacker group called Anonimnyi Internatsional has been leaking information from email accounts and phones of top Russian government officials. Last year, the group even hacked Twitter account of Russian Prime Minister Dmitry Medvedev. One of the representatives of the group told Newsweek that people providing technology for the government were "fantastically incompetent."

Anonimnyi Internatsional’s purpose is to "change the reality." The group's representative said that Sergei Maksimov was only one of the Russian hackers using the alias Hacker Hell. Many, including prominent Russian journalist Oleg Kashin, claim that Anonimnyi Internatsional, is backed by someone within the government, using these leaks for leverage in internal power struggles.

Ein News: http://bit.ly/1Spie6q

 

« 4 Signs a Board thinks Security is Better than it Is
IBM Unveils Most Powerful Chip Ever Created »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

DefCamp

DefCamp

DefCamp is the most important annual conference on Hacking & Information Security in Central Eastern Europe.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

HoxHunt

HoxHunt

HoxHunt is an automated cyber training program that transforms the way your employees react and respond to the growing amount of phishing emails.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Cancom

Cancom

CANCOM group is one of the leading providers of IT infrastructure and IT services in Germany and Austria. Solution areas include network security.

NGS (UK)

NGS (UK)

NGS (UK) Ltd are independent, vendor agnostic, next generation security trusted advisors, providing all-encompassing solutions from the perimeter to the endpoint.

HOBI International

HOBI International

HOBI International is a leading mobile, IT and data center asset management provider with solutions for device management, reverse logistics, data erasure, refurbishment and recycling.

FAIR Institute

FAIR Institute

The FAIR Institute is a non-profit professional organization dedicated to advancing the discipline of measuring and managing information risk.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

Orca Technology

Orca Technology

Orca is a UK-based Managed Service Provider delivering end-to-end managed IT services, support, hosted desktop, cloud solutions and strategic guidance.

Mogwai Labs

Mogwai Labs

Mogwai Labs deliver cutting-edge penetration tests, security assessments and trainings, to safeguard your applications, networks and cloud environments from cyber threats.

Aberrant

Aberrant

A radically new approach to managing information security. Aberrant is the single pane of glass through which a security program can be viewed.