Notorious Hackers Claim Responsibility For Attacks On Labour Party

The Lizard Squad a well know group of hackers has now claimed responsibility for the recent cyberattacks on the British Labour Party's digital systems. Lizard Squad is a black hat hacking group, mainly known for distributed denial of service (DDoS) attacks primarily this was used to disrupt gaming-related services.

DDoS is commonly used by cyber criminals, to directly attack web traffic to a single website or online service in order to cause a system to crash. Labour claimed that the first cyberattacks failed because of the party's "robust security systems however, it then happened again.

It was believed to be the biggest cyberattack yet on a party HQ and follows months of warnings from watchdogs that overseas agencies, including some belonging to the Chinese and Russian governments, were targeting British institutions including the Commons, Whitehall departments and businesses.

Following the attacks, Lizard Squad claimed to be in control of powerful tool known as a botnet that is capable of carrying out such attacks.

“Today’s DDoS attack on the Labour Party is to show that no terrorist-supporting government should allow to rule a country," it stated..... If Labour do win the election, you can expect the whole of the government and Labour websites to go offline," said the member, who shared screenshots appearing to show a botnet tool used to carry out the DDoS attacks.

The nature of botnets makes them extremely difficult to trace, as they are made up of thousands and sometimes millions of hijacked devices from all over the world.

Speculating on the credibility of Lizard Squad's claims, other security experts pointed to the group's history of carrying out similar attacks as evidence it could have been them. In 2018, a US judge sentenced a 20-year-old man who identified as a member of Lizard Squad to three months in prison after he pleaded guilty to carrying out cyberattacks.

Lizard Squad denied that the attacks were commissioned by a third party, however the timing of the attacks mean such a possibility cannot be ruled out. Following the attacks, former GCHQ boss Brian Lord suggested that a hostile nation state may have been behind them, potentially even using them as a distraction to carry out more "sinister" data hacks on the Labour Party.

A Labour spokesperson said the Party did not wish to speculate on the motives or origins of the attack, adding that they had not previously heard of Lizard Squad. Labour leader previously said that attacks against a political party made him "suspicious" and "very nervous" about the upcoming general election.

The first incident was reported to the National Cyber Security Centre, who said: "The attack was not successful and the incident is now closed." However, the second attack has moved events forward and it seems that more attacks on UK political parties digital infrastructure must be expected. 

Independent:          Standard

You Might Also Read: 

DDoS Attacks Up By 84% In Q1:

Who Are The Most Notorious Hacking Groups?:


 

« The Growing Cost Of Cyber Crime
Artificial Intelligence Will Create New Professions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Sopher Networks

Sopher Networks

Sopher is a secure communication and collaboration platform for business and personal use.

MagicCube

MagicCube

MagicCube is a device independent IoT security platform that protects against on-device, cloud, and network attacks.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Shift5

Shift5

Shift5 focus on securing operational technology (OT) by building best-in-class, dual-use products serving military and commercial entities.

Silicon Cloud International

Silicon Cloud International

Silicon Cloud is a high performance and secure cloud computing platform for engineering and scientific applications.

GRSi

GRSi

GRSi deliver next-generation systems engineering, cybersecurity, technology insertion and best practices-based Enterprise Operations (EOps) management.

Kintent

Kintent

With Kintent, compliance becomes a habit, is simple to understand and achieve, and is continuously testable so that your customers can see that you are adhering to all your trust obligations.

Everbridge

Everbridge

Everbridge provides enterprise software applications that automate and accelerate organizations’ operational response to critical events in order to keep people safe and businesses running.

Alibaba Cloud

Alibaba Cloud

Alibaba Cloud is committed to safeguarding the cloud security for every business by leveraging a comprehensive suite of enterprise security services and products on the platform.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

TOTM Technologies

TOTM Technologies

TOTM Technologies provides end-to-end identity management and biometrics products, powering Digital identity and Digital onboarding solutions.

Space Hellas

Space Hellas

Space Hellas is a dynamic, established System Integrator and Value Added Solutions Provider, holding a leading position in the high technology arena.

Cranium

Cranium

AI is being implemented into every business process, but nobody knows whether their AI is secure. Our mission is to deliver security and trust to the AI revolution.