Notorious Hackers Claim Responsibility For Attacks On Labour Party

The Lizard Squad a well know group of hackers has now claimed responsibility for the recent cyberattacks on the British Labour Party's digital systems. Lizard Squad is a black hat hacking group, mainly known for distributed denial of service (DDoS) attacks primarily this was used to disrupt gaming-related services.

DDoS is commonly used by cyber criminals, to directly attack web traffic to a single website or online service in order to cause a system to crash. Labour claimed that the first cyberattacks failed because of the party's "robust security systems however, it then happened again.

It was believed to be the biggest cyberattack yet on a party HQ and follows months of warnings from watchdogs that overseas agencies, including some belonging to the Chinese and Russian governments, were targeting British institutions including the Commons, Whitehall departments and businesses.

Following the attacks, Lizard Squad claimed to be in control of powerful tool known as a botnet that is capable of carrying out such attacks.

“Today’s DDoS attack on the Labour Party is to show that no terrorist-supporting government should allow to rule a country," it stated..... If Labour do win the election, you can expect the whole of the government and Labour websites to go offline," said the member, who shared screenshots appearing to show a botnet tool used to carry out the DDoS attacks.

The nature of botnets makes them extremely difficult to trace, as they are made up of thousands and sometimes millions of hijacked devices from all over the world.

Speculating on the credibility of Lizard Squad's claims, other security experts pointed to the group's history of carrying out similar attacks as evidence it could have been them. In 2018, a US judge sentenced a 20-year-old man who identified as a member of Lizard Squad to three months in prison after he pleaded guilty to carrying out cyberattacks.

Lizard Squad denied that the attacks were commissioned by a third party, however the timing of the attacks mean such a possibility cannot be ruled out. Following the attacks, former GCHQ boss Brian Lord suggested that a hostile nation state may have been behind them, potentially even using them as a distraction to carry out more "sinister" data hacks on the Labour Party.

A Labour spokesperson said the Party did not wish to speculate on the motives or origins of the attack, adding that they had not previously heard of Lizard Squad. Labour leader previously said that attacks against a political party made him "suspicious" and "very nervous" about the upcoming general election.

The first incident was reported to the National Cyber Security Centre, who said: "The attack was not successful and the incident is now closed." However, the second attack has moved events forward and it seems that more attacks on UK political parties digital infrastructure must be expected. 

Independent:          Standard

You Might Also Read: 

DDoS Attacks Up By 84% In Q1:

Who Are The Most Notorious Hacking Groups?:


 

« The Growing Cost Of Cyber Crime
Artificial Intelligence Will Create New Professions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

CERT-SE

CERT-SE

CERT-SE is the national and governmental Computer Security Incident Response Team of Sweden.

Cloud53

Cloud53

Cloud53 specialise in improving operational IT through strategic use of Cloud technologies and services.

Celestya

Celestya

Celestya is dedicated to providing the most advanced and cost effective systems for human behavior education on cybersecurity awareness training.

MindPoint Group (MPG)

MindPoint Group (MPG)

MindPoint Group is a specialist Information Security Consulting firm.

Magtech Solutions

Magtech Solutions

Magtech Solutions is a one-stop IT Solutions provider offering Cloud Computing, IT Security, Unified Email Solutions and ERP systems.

Method Cyber Security

Method Cyber Security

Method offers a Cyber Security Risk Management training course for those responsible for the security of industrial automation, control and safety systems.

Ergo

Ergo

Ergo is a world-class IT Partner of choice, leveraging the latest technology available in cloud, mobility, big data, analytics, and social media.

Global Resources

Global Resources

Global Resources' planning and management capabilities support city, regional, and national utility and infrastructure management, and information systems and cyber security service delivery.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

KeyData Associates

KeyData Associates

KeyData is a recognized leader in cybersecurity services specializing in Identity and Access Management (IAM), Customer Identity & Access Management (CIAM) and Privileged Access Management (PAM).

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

CyberNut

CyberNut

CyberNut are a security awareness training solution built exclusively for schools.

ZEST Security

ZEST Security

The ZEST platform natively integrates into your technology stack to make efficient risk remediation possible.