Cyberwarfare is Common in Russia

B79D67F9-DF57-4DD4-88D6-0DB2ADA41D10_cx0_cy9_cw0_mw1024_s_n_r1.jpgAlleged Notorious Hacker Sergei Maksimov 

Over the years, Hacker Hell has broken into the Twitter Inc and email accounts of prominent opposition leaders and bloggers. In Russia, the government controls traditional media. And President Vladimir Putin's aides run a troll factory in St. Petersburg to compromise, expose, and even hurt Putin's enemies. So, hacks, data theft, and other forms of cyberwarfare are common in Russia.

The court trials have been extended and so Sergei Maksimov is yet to be proved guilty. Whether or not Hacker Hell was working for the Kremlin, the case offers a sneak peek into Russia's heating internal cyberwarfare. Hacker Hell twice hacked the email and Twitter accounts of opposition leader Alexei Navalny. He created a lot of enemies in the process of hacking popular bloggers and politicians.

Eventually, two journalists traced Hacker Hell down as Sergei Maksimov, a Russian who moved to Germany in 1997, reports Newsweek. When police came with a search warrant to Maksimov’s house upon being persuaded by Navalny, they found a document called "Gospel According to Hell," a notebook signed with "Hell", among other things.
Hackers are fighting back government-sponsored Trolls in Russia

The Kremlin may have an army of its own hackers, but some hackers have started fighting back. For over a year, a hacker group called Anonimnyi Internatsional has been leaking information from email accounts and phones of top Russian government officials. Last year, the group even hacked Twitter account of Russian Prime Minister Dmitry Medvedev. One of the representatives of the group told Newsweek that people providing technology for the government were "fantastically incompetent."

Anonimnyi Internatsional’s purpose is to "change the reality." The group's representative said that Sergei Maksimov was only one of the Russian hackers using the alias Hacker Hell. Many, including prominent Russian journalist Oleg Kashin, claim that Anonimnyi Internatsional, is backed by someone within the government, using these leaks for leverage in internal power struggles.

Ein News: http://bit.ly/1Spie6q

 

« 4 Signs a Board thinks Security is Better than it Is
IBM Unveils Most Powerful Chip Ever Created »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Rollbar

Rollbar

Rollbar is a full-stack error monitoring platform for web and mobile applications. We help developers find and fix bugs fast. Built by developers for developers.

CDNetworks

CDNetworks

CDNetworks is a global content delivery network with a fully integrated cloud security solution, offering unparalleled speed, security and reliability for the almost instant delivery of web content.

Anomali

Anomali

Anomali delivers intelligence-driven cybersecurity solutions to enhance threat visibility, automate threat processing and detection, and accelerate threat investigation, response, and remediation.

Sopra Steria

Sopra Steria

Sopra Steria is a leading European information technology consultancy.

NetExtend

NetExtend

NetExtend services include backup and recovery, endpoint protection, network monitoring, cloud portal and billing and payment solutions.

Protocol Policy Systems

Protocol Policy Systems

Protocol Policy Systems specialise in IT policy deployment and management systems that deliver compliance and secure computing environments.

Swarmnetics

Swarmnetics

Swarmnetics helps customers discover hard-to-find software vulnerabilities by hacking your system before the bad guys do.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

CACI International

CACI International

CACI is at the forefront of developing and delivering technological breakthroughs that transform and optimize government operations.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

DataPatrol

DataPatrol

DataPatrol is a software company, specialized in providing Security and Privacy of company’s data and information in an evolved way.

Computer Futures

Computer Futures

Computer Futures are a global specialist IT recruitment partner, matching candidates with roles across niche IT markets and core technologies.