Anonymous Hackers Aim To Undermine Russia

Soon after Putin's invasion of Ukraine, Anonymous declared a cyber war on Russia and now the hacktivist collective has been bombarding Russia with cyber attacks on President Vladimir Putin in retaliation for the invasion of Ukraine.

The hacktivist collective has claimed responsibility for disabling government, corporate, and news websites and says it has taken down Russian websites and stolen government data.

One such incident was captured in a short video clip which shows normal programming interrupted with images of bombs exploding in Ukraine and soldiers talking about the horrors of the conflict. The exploit has the various hallmarks of an Anonymous hack, id dramatic, impactful and easy to share online and, like many of the group's other cyber attacks, it is extremely hard to verify. 

Hackers have mostly been using DDoS attacks, where a server is overwhelmed by a flood of requests.The hackers have justified their actions saying innocent Ukrainians were being massacred. 

Who Are Anonymous?

  • The hacktivist collective first emerged in 2003 from the website 4chan.
  • The group has no leadership, its motto is "We are legion".
  • Anyone can claim to be a part of the group and hack for any cause they want, but they generally they attack organisations accused of misusing power
  • Their symbol is a Guy Fawkes mask, made famous by Alan Moore's graphic novel V for Vendetta in which an anarchist revolutionary topples a corrupt fascist government.
  • The group has many social media accounts, with 15.5 million followers on its Twitter pages alone

Anonymous hackers have also defaced Russian websites, which involves gaining control of a website to change the content displayed. So far, the attacks have caused disruption and embarrassment, but cyber-experts have become increasingly concerned by the explosion of hacktivism since the invasion. They are legitimate concerns that that an Anonymous hacker might knock out a hospital's computer network or interrupt critical communication links accidentally.

Anonymous has not been this active in years. One example of a new recruit is  'Roman', is a Ukrainian tech entrepreneur who heads a group of hackers called 'Stand for Ukraine', had no links with the organisation until Russia invaded his country. Another group that has merged with Anonymous is a Polish hacking team called Squad 303, named after a famous Polish Royal Air Force fighter squadron in World War Two.

There have been three major waves of co-ordinated DDoS attacks against Ukraine since January, plus three incidents of more serious "wiper" attacks that deleted data on a small number of Ukrainian computer systems.

Twitter AnonTV:     Fortune:      BBC:      You Tube:       recents:    Daily Star:  

You Might Also Read:

Ukraine: Spam Website To Reach Millions Of Russians:

 

« Zelensky Deepfake Tells Ukrainians To ‘lay down arms’
The British Online Harms Bill Takes Shape »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

D-RisQ

D-RisQ

D-RisQ is focussed on delivering techniques to reduce the development costs of complex systems and software whilst maximising compliance

TBG Security

TBG Security

TBG provides a portfolio of services including cyber security, compliance and continuity solutions.

Digitus Biometrics

Digitus Biometrics

Digitus Biometrics is a market leader in biometric access control. We can secure access to any entry point, from the front door to the server rack cabinet.

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT (CSP-CERT)

Cybersecurity Philippines CERT is the national Computer Emergency Response Team for the Philippines.

Mako Networks

Mako Networks

The Mako System is an award winning networking and security service designed specifically for SMEs and branch offices of larger organisations.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

archTIS

archTIS

archTIS specialises in the design and development of products, solutions and services for secure information sharing and collaboration.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Enea

Enea

Enea is one of the world’s leading specialists in software for telecommunications and cybersecurity. Our products are used to enable services for mobile subscribers, enterprise customers and IoT.

Astrix Security

Astrix Security

Astrix enables security teams to instantly see through the fog of connects and detect redundant, misconfigured and malicious third-party exposure to their critical systems.

Teleskope

Teleskope

Teleskope are on a mission to empower businesses to protect sensitive data by default.

CyXcel

CyXcel

CyXcel is a cyber security consulting business grounded in the law which natively fuses crises, legal, technical, and consulting expertise digital networks, information and operational technology.