Cyberwarfare is Common in Russia

B79D67F9-DF57-4DD4-88D6-0DB2ADA41D10_cx0_cy9_cw0_mw1024_s_n_r1.jpgAlleged Notorious Hacker Sergei Maksimov 

Over the years, Hacker Hell has broken into the Twitter Inc and email accounts of prominent opposition leaders and bloggers. In Russia, the government controls traditional media. And President Vladimir Putin's aides run a troll factory in St. Petersburg to compromise, expose, and even hurt Putin's enemies. So, hacks, data theft, and other forms of cyberwarfare are common in Russia.

The court trials have been extended and so Sergei Maksimov is yet to be proved guilty. Whether or not Hacker Hell was working for the Kremlin, the case offers a sneak peek into Russia's heating internal cyberwarfare. Hacker Hell twice hacked the email and Twitter accounts of opposition leader Alexei Navalny. He created a lot of enemies in the process of hacking popular bloggers and politicians.

Eventually, two journalists traced Hacker Hell down as Sergei Maksimov, a Russian who moved to Germany in 1997, reports Newsweek. When police came with a search warrant to Maksimov’s house upon being persuaded by Navalny, they found a document called "Gospel According to Hell," a notebook signed with "Hell", among other things.
Hackers are fighting back government-sponsored Trolls in Russia

The Kremlin may have an army of its own hackers, but some hackers have started fighting back. For over a year, a hacker group called Anonimnyi Internatsional has been leaking information from email accounts and phones of top Russian government officials. Last year, the group even hacked Twitter account of Russian Prime Minister Dmitry Medvedev. One of the representatives of the group told Newsweek that people providing technology for the government were "fantastically incompetent."

Anonimnyi Internatsional’s purpose is to "change the reality." The group's representative said that Sergei Maksimov was only one of the Russian hackers using the alias Hacker Hell. Many, including prominent Russian journalist Oleg Kashin, claim that Anonimnyi Internatsional, is backed by someone within the government, using these leaks for leverage in internal power struggles.

Ein News: http://bit.ly/1Spie6q

 

« 4 Signs a Board thinks Security is Better than it Is
IBM Unveils Most Powerful Chip Ever Created »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Atlantic Council

Atlantic Council

The Atlantic Council's Cyber Statecraft Initiative focuses on international cooperation, competition, and conflict in cyberspace.

Infineon Technologies

Infineon Technologies

Infineon is a leader in semiconductor solutions for a huge range of applications including automation, smart systems and security for the Internet of Things.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

Luxar Tech

Luxar Tech

Luxar's network visibility products enable enterprises and service providers to monitor network traffic, improve security and optimize efficiency.

Verimuchme

Verimuchme

Verimuchme is a digital wallet and exchange platform to secure, verify and re-use personal information.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

British Blockchain Association (BBA)

British Blockchain Association (BBA)

British Blockchain Association (BBA) is a not-for-profit organisation that promotes evidence-based adoption of Blockchain and Distributed Ledger Technologies (DLT) across the public and private sector

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Valtix

Valtix

Valtix is the first and only multi-cloud network security platform delivered as a service that enables cloud teams to meet the most stringent security requirements in a cloud-first & simple way.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

Pacific Certifications

Pacific Certifications

Pacific Certifications provide accredited certification, training and support services to help you improve processes, performance and products and services.

STACK Cybersecurity

STACK Cybersecurity

STACK Cybersecurity serves as a strategic partner, guiding you through the intricate and dynamic cybersecurity landscape.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.

Digital Technologies Group (DTG)

Digital Technologies Group (DTG)

DTG are a digital transformation company helping process organisations embrace smarter manufacturing through the adoption of industry 4.0 technologies and solutions.

MineOS

MineOS

MineOS aligns compliance with business growth. We designed our platform so that privacy compliance efforts directly benefit other teams and initiatives.