Notorious Hackers Claim Responsibility For Attacks On Labour Party

The Lizard Squad a well know group of hackers has now claimed responsibility for the recent cyberattacks on the British Labour Party's digital systems. Lizard Squad is a black hat hacking group, mainly known for distributed denial of service (DDoS) attacks primarily this was used to disrupt gaming-related services.

DDoS is commonly used by cyber criminals, to directly attack web traffic to a single website or online service in order to cause a system to crash. Labour claimed that the first cyberattacks failed because of the party's "robust security systems however, it then happened again.

It was believed to be the biggest cyberattack yet on a party HQ and follows months of warnings from watchdogs that overseas agencies, including some belonging to the Chinese and Russian governments, were targeting British institutions including the Commons, Whitehall departments and businesses.

Following the attacks, Lizard Squad claimed to be in control of powerful tool known as a botnet that is capable of carrying out such attacks.

“Today’s DDoS attack on the Labour Party is to show that no terrorist-supporting government should allow to rule a country," it stated..... If Labour do win the election, you can expect the whole of the government and Labour websites to go offline," said the member, who shared screenshots appearing to show a botnet tool used to carry out the DDoS attacks.

The nature of botnets makes them extremely difficult to trace, as they are made up of thousands and sometimes millions of hijacked devices from all over the world.

Speculating on the credibility of Lizard Squad's claims, other security experts pointed to the group's history of carrying out similar attacks as evidence it could have been them. In 2018, a US judge sentenced a 20-year-old man who identified as a member of Lizard Squad to three months in prison after he pleaded guilty to carrying out cyberattacks.

Lizard Squad denied that the attacks were commissioned by a third party, however the timing of the attacks mean such a possibility cannot be ruled out. Following the attacks, former GCHQ boss Brian Lord suggested that a hostile nation state may have been behind them, potentially even using them as a distraction to carry out more "sinister" data hacks on the Labour Party.

A Labour spokesperson said the Party did not wish to speculate on the motives or origins of the attack, adding that they had not previously heard of Lizard Squad. Labour leader previously said that attacks against a political party made him "suspicious" and "very nervous" about the upcoming general election.

The first incident was reported to the National Cyber Security Centre, who said: "The attack was not successful and the incident is now closed." However, the second attack has moved events forward and it seems that more attacks on UK political parties digital infrastructure must be expected. 

Independent:          Standard

You Might Also Read: 

DDoS Attacks Up By 84% In Q1:

Who Are The Most Notorious Hacking Groups?:


 

« The Growing Cost Of Cyber Crime
Artificial Intelligence Will Create New Professions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Security Audit Systems

Security Audit Systems

Security Audit Systems is a website security specialist providing website security audits and managed web security services.

ControlCase

ControlCase

ControlCase provide solutions that address all aspects of IT-GRCM (Governance, Risk Management and Compliance Management).

Minerva Labs

Minerva Labs

Minerva’s patent pending solution keeps malware in a constant sleep state before it can infiltrate your network and cause any damage.

Online Business Systems

Online Business Systems

Online Business Systems is an information technology and business consultancy. We design improved business processes enabled with robust and secure information systems.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

AlertSec

AlertSec

AlertSec Ensure is a U.S. patented technology that allows you to educate, verify and enforce encryption compliance of third-party devices.

SIRP Labs

SIRP Labs

SIRP is a Risk-based Security Orchestration, Automation and Response (SOAR) platform that fuses essential cybersecurity information to enable a unified cyber response.

Voodoo Security

Voodoo Security

Voodoo Security is a specialized information security consulting firm focused on security assessments, risk and compliance analysis, and cloud security.

National Institute for Research & Development in Informatics (ICI Bucharest)

National Institute for Research & Development in Informatics (ICI Bucharest)

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

Gen Digital

Gen Digital

At Gen™, our mission is to create technology solutions for people to take full advantage of the digital world, safely, privately, and confidently – so together, we can build a better tomorrow.

Strivacity

Strivacity

Strivacity lets brands quickly add secure login and identity management capabilities to their customer-facing applications without tying up an army of developers or consultants to do it.

SEALSQ

SEALSQ

For the last 25 years, SEALSQ have been developing secure semiconductor chips, secure embedded firmware, and tested hardware provisioning services to serve the vision of a safer connected world.

Secolve

Secolve

Secolve is Australia’s next generation OT specialist cyber security firm, working with key industries to protect the nation’s critical infrastructure.