Cyberwarfare is Common in Russia

B79D67F9-DF57-4DD4-88D6-0DB2ADA41D10_cx0_cy9_cw0_mw1024_s_n_r1.jpgAlleged Notorious Hacker Sergei Maksimov 

Over the years, Hacker Hell has broken into the Twitter Inc and email accounts of prominent opposition leaders and bloggers. In Russia, the government controls traditional media. And President Vladimir Putin's aides run a troll factory in St. Petersburg to compromise, expose, and even hurt Putin's enemies. So, hacks, data theft, and other forms of cyberwarfare are common in Russia.

The court trials have been extended and so Sergei Maksimov is yet to be proved guilty. Whether or not Hacker Hell was working for the Kremlin, the case offers a sneak peek into Russia's heating internal cyberwarfare. Hacker Hell twice hacked the email and Twitter accounts of opposition leader Alexei Navalny. He created a lot of enemies in the process of hacking popular bloggers and politicians.

Eventually, two journalists traced Hacker Hell down as Sergei Maksimov, a Russian who moved to Germany in 1997, reports Newsweek. When police came with a search warrant to Maksimov’s house upon being persuaded by Navalny, they found a document called "Gospel According to Hell," a notebook signed with "Hell", among other things.
Hackers are fighting back government-sponsored Trolls in Russia

The Kremlin may have an army of its own hackers, but some hackers have started fighting back. For over a year, a hacker group called Anonimnyi Internatsional has been leaking information from email accounts and phones of top Russian government officials. Last year, the group even hacked Twitter account of Russian Prime Minister Dmitry Medvedev. One of the representatives of the group told Newsweek that people providing technology for the government were "fantastically incompetent."

Anonimnyi Internatsional’s purpose is to "change the reality." The group's representative said that Sergei Maksimov was only one of the Russian hackers using the alias Hacker Hell. Many, including prominent Russian journalist Oleg Kashin, claim that Anonimnyi Internatsional, is backed by someone within the government, using these leaks for leverage in internal power struggles.

Ein News: http://bit.ly/1Spie6q

 

« 4 Signs a Board thinks Security is Better than it Is
IBM Unveils Most Powerful Chip Ever Created »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

OneLogin

OneLogin

OneLogin simplifies identity management with secure, one-click access,for employees, customers and partners, through all device types, to all enterprise cloud and on-premise applications.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Solana Networks

Solana Networks

Solana Networks is a specialist in IT networking and security.

CYQUEO

CYQUEO

CYQUEO is your professional partner and system integrator. We secure your organization against advanced cyber threats.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

eResilience

eResilience

eResilience is a division of Referentia Systems, a pioneer in an ultra-secure information safeguarding technique known as “Enclaving”, in which data can be segmented and protected within a network.

Cythereal

Cythereal

Cythereal is the leader in predicting and preventing advanced malware attacks. Security Automation for the Overwhelmed Administrator.

Trusted Security Solutions (TSS)

Trusted Security Solutions (TSS)

TSS are specialist in IT Security and providing Cybersecurity Solutions & Services combined with storage and backup.

International Cyber Threat Task Force (ICTTF)

International Cyber Threat Task Force (ICTTF)

The International Cyber Threat Task Force is a not-for-profit initiative promoting the ecosystem of an International independent non-partisan cyber security community.

Sweet Security

Sweet Security

Sweet Security delivers Runtime Attack Security for Cloud Workloads.

Allstate Identity Protection

Allstate Identity Protection

Allstate make it easy to provide complete identity protection, so everyone can live more confidently online.

DataStealth

DataStealth

DataStealth is a data protection platform that allows organizations to discover, classify, and protect their most sensitive data and documents.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Straiker

Straiker

Straiker's AI-native security platform is designed to protect enterprise AI applications and autonomous agents from evolving threats through automated assessment and runtime guardrails.