Cyberwarfare is Common in Russia

B79D67F9-DF57-4DD4-88D6-0DB2ADA41D10_cx0_cy9_cw0_mw1024_s_n_r1.jpgAlleged Notorious Hacker Sergei Maksimov 

Over the years, Hacker Hell has broken into the Twitter Inc and email accounts of prominent opposition leaders and bloggers. In Russia, the government controls traditional media. And President Vladimir Putin's aides run a troll factory in St. Petersburg to compromise, expose, and even hurt Putin's enemies. So, hacks, data theft, and other forms of cyberwarfare are common in Russia.

The court trials have been extended and so Sergei Maksimov is yet to be proved guilty. Whether or not Hacker Hell was working for the Kremlin, the case offers a sneak peek into Russia's heating internal cyberwarfare. Hacker Hell twice hacked the email and Twitter accounts of opposition leader Alexei Navalny. He created a lot of enemies in the process of hacking popular bloggers and politicians.

Eventually, two journalists traced Hacker Hell down as Sergei Maksimov, a Russian who moved to Germany in 1997, reports Newsweek. When police came with a search warrant to Maksimov’s house upon being persuaded by Navalny, they found a document called "Gospel According to Hell," a notebook signed with "Hell", among other things.
Hackers are fighting back government-sponsored Trolls in Russia

The Kremlin may have an army of its own hackers, but some hackers have started fighting back. For over a year, a hacker group called Anonimnyi Internatsional has been leaking information from email accounts and phones of top Russian government officials. Last year, the group even hacked Twitter account of Russian Prime Minister Dmitry Medvedev. One of the representatives of the group told Newsweek that people providing technology for the government were "fantastically incompetent."

Anonimnyi Internatsional’s purpose is to "change the reality." The group's representative said that Sergei Maksimov was only one of the Russian hackers using the alias Hacker Hell. Many, including prominent Russian journalist Oleg Kashin, claim that Anonimnyi Internatsional, is backed by someone within the government, using these leaks for leverage in internal power struggles.

Ein News: http://bit.ly/1Spie6q

 

« 4 Signs a Board thinks Security is Better than it Is
IBM Unveils Most Powerful Chip Ever Created »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

NTOP

NTOP

NTOP develop high-quality network traffic analysis and DDoS protection software used by small individuals as well by large telecom operators.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

FFRI Security

FFRI Security

FFRI is committed to research and development of preventing the most advanced cyber-attacks and breaches.

CSIRT Italia

CSIRT Italia

CSIRT Italia is the national Computer Security Incident Response Team for Italy.

IFE Digital Systems

IFE Digital Systems

IFE Digital Systems conducts research, development and consultancy in risk, safety and security related to digital systems in critical infrastructure.

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance (TCA)

Trusted Connectivity Alliance is a global, non-profit industry association which is working to enable a secure connected future.

AEWIN Technologies

AEWIN Technologies

AEWIN is professional in the fields of Network Appliance, Cyber Security, Server, Edge Computing and an ODM/OEM expert.

Tentacle

Tentacle

Tentacle has developed a configurable data management tool that helps organizations to improve their information security programs and overall security posture.

Getronics

Getronics

Getronics guides customers through their own transformation journeys, leveraging an integrated and secure-by-design IT portfolio.

N2K Networks

N2K Networks

N2K Networks is the world’s first “news to knowledge” network. The news to knowledge network is how you stay at the cutting edge in a rapidly changing world.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Hetz Ventures

Hetz Ventures

Hetz Ventures is a global-facing VC investing in highly talented and ambitious Israeli founders who operate at the cutting edge of deep technology.

Versent

Versent

Versent is an Australian-born technology company, focused on architecting, building & operating cloud native applications, data streams, platforms, and services.