Notorious Hackers Claim Responsibility For Attacks On Labour Party

The Lizard Squad a well know group of hackers has now claimed responsibility for the recent cyberattacks on the British Labour Party's digital systems. Lizard Squad is a black hat hacking group, mainly known for distributed denial of service (DDoS) attacks primarily this was used to disrupt gaming-related services.

DDoS is commonly used by cyber criminals, to directly attack web traffic to a single website or online service in order to cause a system to crash. Labour claimed that the first cyberattacks failed because of the party's "robust security systems however, it then happened again.

It was believed to be the biggest cyberattack yet on a party HQ and follows months of warnings from watchdogs that overseas agencies, including some belonging to the Chinese and Russian governments, were targeting British institutions including the Commons, Whitehall departments and businesses.

Following the attacks, Lizard Squad claimed to be in control of powerful tool known as a botnet that is capable of carrying out such attacks.

“Today’s DDoS attack on the Labour Party is to show that no terrorist-supporting government should allow to rule a country," it stated..... If Labour do win the election, you can expect the whole of the government and Labour websites to go offline," said the member, who shared screenshots appearing to show a botnet tool used to carry out the DDoS attacks.

The nature of botnets makes them extremely difficult to trace, as they are made up of thousands and sometimes millions of hijacked devices from all over the world.

Speculating on the credibility of Lizard Squad's claims, other security experts pointed to the group's history of carrying out similar attacks as evidence it could have been them. In 2018, a US judge sentenced a 20-year-old man who identified as a member of Lizard Squad to three months in prison after he pleaded guilty to carrying out cyberattacks.

Lizard Squad denied that the attacks were commissioned by a third party, however the timing of the attacks mean such a possibility cannot be ruled out. Following the attacks, former GCHQ boss Brian Lord suggested that a hostile nation state may have been behind them, potentially even using them as a distraction to carry out more "sinister" data hacks on the Labour Party.

A Labour spokesperson said the Party did not wish to speculate on the motives or origins of the attack, adding that they had not previously heard of Lizard Squad. Labour leader previously said that attacks against a political party made him "suspicious" and "very nervous" about the upcoming general election.

The first incident was reported to the National Cyber Security Centre, who said: "The attack was not successful and the incident is now closed." However, the second attack has moved events forward and it seems that more attacks on UK political parties digital infrastructure must be expected. 

Independent:          Standard

You Might Also Read: 

DDoS Attacks Up By 84% In Q1:

Who Are The Most Notorious Hacking Groups?:


 

« The Growing Cost Of Cyber Crime
Artificial Intelligence Will Create New Professions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Electus Recruitment Solutions

Electus Recruitment Solutions

Electus is a leading recruitment specialist in the Engineering, Technology & Digital and Cyber & Security sectors.

Crossword Cybersecurity

Crossword Cybersecurity

We work with research intensive European university partners to identify promising cyber security intellectual property from research that meets emerging real-world challenges.

StackRox

StackRox

StackRox delivers a container-native security platform that adapts detection and response to new threats.

Sungard Availability Services (Sungard AS)

Sungard Availability Services (Sungard AS)

Sungard AS partners with customers around the globe to understand their unique business needs and provide production and recovery services tailored to their requirements.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Inogesis

Inogesis

Inogesis helps blue-chip organisations harness disruptive technologies and thinking to drive new revenues or overcome challenges by connecting them with dynamic small companies.

Lepide

Lepide

LepideAuditor is a powerful Data Security Platform that enables you to reduce risk, prevent data breaches and prove regulatory compliance.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance Solutions

Resilience Cyber Insurance combines insurance expertise with cybersecurity and data talent to deliver clear, effective solutions to protect you for the cyberrisks of today—and tomorrow.

SilverSky

SilverSky

SilverSky offers a comprehensive suite of products and services that deliver unprecedented simplicity and expertise for compliance and cybersecurity programs.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

LimaCharlie

LimaCharlie

LimaCharlie gives security teams full control over how they manage their security infrastructure. Get full visibility, build what you want, control your data, get the security capabilities you need.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Simbian

Simbian

Simbian, with its hardened TrustedLLM system, is the first to accelerate security by empowering every member of a security team from the C-Suite to frontline practitioners.

WaveLink

WaveLink

WaveLink offers low risk, results-oriented Engineering Services and best-of-class Technical Support Services. Areas of expertise include cyber and security engineering.