blockisthenewchain.com
  • Home
  • Cybersecurity
    • All
    • Corporate Security
    • Data Security
    • System security
    • Web Security
    edge computing

    How important is Edge Computing Security?

    Enhance Smart Cybersecurity

    Three Cognitive Technologies to Enhance Smart Cybersecurity

    phishing_result

    An 11-fold increase in phishing attacks exploiting SaaS platforms

    phishing attacks exploiting saas

    A Simple Guide to Manually Renewing an SSL Certificate

    Protecting Your WordPress Site

    6 Tips for Protecting Your WordPress Site

    Secure SSH Server

    8 Ways to Secure SSH Server Connections on Linux

    Trending Tags

    • Vulnerability
    • IoT-Security
    • Metaverse
    • Application Security
    • Cloud-Security
  • Hacking stories
    • All
    • Apps Hacking stories
    • Exchange Hacking stories
    protect your smart home

    How to protect your Smart Home from hackers

    Hacking Anonymous

    6 ways the hacker group Anonymous is waging cyber-war against Russia

    Investment scammers

    Investment scammers target dating app users

    Axie-Infinity-AXS-Metaverse

    Hacking Story: How a fake job offer took down the world’s most popular crypto game?

    Trending Tags

    • Artificial-Intelligence
    • website security
    • Deep-Learning
    • Hacker-Attack-and-Defense
  • News
    • All
    • Business
    • Crypto News
    • Cybersecurity News
    • World News
    Vitalik-meta

    Meta’s metaverse is doomed, says Vitalik Buterin

    Tiner metaverse

    Tinder puts its metaverse and digital currency project on hold

    bernard arnault

    Bernard Arnault’s investment fund will invest 100 million euros in Web3

    invest in cybersecurity startup

    How can VCs invest in cybersecurity startups in challenging times?

    Venture-Capital-decline

    Cybersecurity Venture Capital Investments: Severe Decline in Q2 2022

    SaaS Security Certification

    A Comprehensive Guide to SaaS Security Certification

    Trending Tags

    • WEB3
    • DEFI
    • Crypto
    • Blockchain
    • Data Security
  • Blockchain
    • All
    • Cryptocurrency
    • Metaverse
    • NFT
    • Trends and DEFI
    • Web3
    blockchain API

    Excellent blockchain API for developers

    The next generation of blockchains

    The next generation of blockchains – cross-chain interoperability

    massa-autonomous-smart-contracts

    Can autonomous smart contracts be the future of blockchain technology?

    blockchain-Blockisthenewchain

    Blockchain Basics – What is Blockchain Technology

    metaverse-cloud

    How will the metaverse affect cloud security?

    What is MetaMask

    What is MetaMask? And is it safe to use?

  • Startups
  • Login
No Result
View All Result
  • Home
  • Cybersecurity
    • All
    • Corporate Security
    • Data Security
    • System security
    • Web Security
    edge computing

    How important is Edge Computing Security?

    Enhance Smart Cybersecurity

    Three Cognitive Technologies to Enhance Smart Cybersecurity

    phishing_result

    An 11-fold increase in phishing attacks exploiting SaaS platforms

    phishing attacks exploiting saas

    A Simple Guide to Manually Renewing an SSL Certificate

    Protecting Your WordPress Site

    6 Tips for Protecting Your WordPress Site

    Secure SSH Server

    8 Ways to Secure SSH Server Connections on Linux

    Trending Tags

    • Vulnerability
    • IoT-Security
    • Metaverse
    • Application Security
    • Cloud-Security
  • Hacking stories
    • All
    • Apps Hacking stories
    • Exchange Hacking stories
    protect your smart home

    How to protect your Smart Home from hackers

    Hacking Anonymous

    6 ways the hacker group Anonymous is waging cyber-war against Russia

    Investment scammers

    Investment scammers target dating app users

    Axie-Infinity-AXS-Metaverse

    Hacking Story: How a fake job offer took down the world’s most popular crypto game?

    Trending Tags

    • Artificial-Intelligence
    • website security
    • Deep-Learning
    • Hacker-Attack-and-Defense
  • News
    • All
    • Business
    • Crypto News
    • Cybersecurity News
    • World News
    Vitalik-meta

    Meta’s metaverse is doomed, says Vitalik Buterin

    Tiner metaverse

    Tinder puts its metaverse and digital currency project on hold

    bernard arnault

    Bernard Arnault’s investment fund will invest 100 million euros in Web3

    invest in cybersecurity startup

    How can VCs invest in cybersecurity startups in challenging times?

    Venture-Capital-decline

    Cybersecurity Venture Capital Investments: Severe Decline in Q2 2022

    SaaS Security Certification

    A Comprehensive Guide to SaaS Security Certification

    Trending Tags

    • WEB3
    • DEFI
    • Crypto
    • Blockchain
    • Data Security
  • Blockchain
    • All
    • Cryptocurrency
    • Metaverse
    • NFT
    • Trends and DEFI
    • Web3
    blockchain API

    Excellent blockchain API for developers

    The next generation of blockchains

    The next generation of blockchains – cross-chain interoperability

    massa-autonomous-smart-contracts

    Can autonomous smart contracts be the future of blockchain technology?

    blockchain-Blockisthenewchain

    Blockchain Basics – What is Blockchain Technology

    metaverse-cloud

    How will the metaverse affect cloud security?

    What is MetaMask

    What is MetaMask? And is it safe to use?

  • Startups
No Result
View All Result
blockisthenewchain.com
No Result
View All Result
Home Hacking stories Apps Hacking stories

6 ways the hacker group Anonymous is waging cyber-war against Russia

U.S. cybersecurity experts have summarized six ways in which the hacker organization "Anonymous" carried out cyberattacks on Russia , and commented on the effects of their attacks.

BlockIsTheNewChain by BlockIsTheNewChain
September 4, 2022
in Apps Hacking stories, Hacking stories
451 9
0
Hacking Anonymous
31
SHARES
1.5k
VIEWS
Share on TwitterShare on LinkedinShare on FacebookShare on Telegram

U.S. cybersecurity experts have summarized six ways in which the hacker organization “Anonymous” carried out cyberattacks on Russia , and commented on the effects of their attacks.

The Anonymous cyber attacks on Russia are mainly divided into six categories: first, intrusion into databases, publishing information on attacked entities or persons, or tampering with and deleting hacked files; second, attacking companies that continue to operate in Russia, including blocking websites , leaking company data, etc., thereby increasing the financial risk of the company continuing to operate in Russia; third, through distributed denial of service attacks to paralyze the website, causing key applications to be unusable or even stop operation and production; fourth, training low-level personnel to carry out basic mission to allow skilled hackers to launch more advanced attacks while providing cybersecurity assistance to Ukraine; fifth, hijacking media and streaming services to publish censored images and messages; and sixth, direct propaganda against Russian personnel, including hacking printers to Print anti-war and pro-Ukrainian messages, send messages to users of Russian social networking site VK, make phone calls, send emails and text messages, and more.

Cybersecurity experts say the ongoing activities of Anonymous have uncovered the “mystery” of Russia’s cybersecurity capabilities, putting the Russian government and its cybersecurity technology in an “embarrassment” position; It also rewrites the rules of how to crowdsource modern cyber-warfare; the massive amount of information leaked by Anonymous could prompt more network penetration, causing the system to “fall like dominoes.”

The Qi’an Internet Intelligence Bureau has compiled the relevant information for readers’ reference.

cybersecurity result 1

The ongoing activities of the hacker group Anonymous are putting Russia and its cybersecurity technology in an “embarrassment” situation.

Jeremiah Fowler, co-founder of US cybersecurity firm Security Discovery, said he has been following the hacking group Anonymous since it declared a “cyber war” against Russia.

“Anonymous makes Russia’s government and civilian cyber defenses vulnerable,” Fowler said. “The group has demystified Russia’s cyber capabilities and has successfully embarrassed Russian companies, government agencies, energy companies and others.” “This country may be the ‘Iron Curtain,’ but at the scale of the hacking army’s online attacks, it seems more like a ‘paper curtain,'” Fowler said.

“Anonymous” Claims Category Ranking

Fowler said Anonymous and its affiliates have not lost momentum despite the missile strikes grabbing headlines in recent days. Fowler summarizes the group’s many claims against Russia and divides them into six categories in order of effectiveness:

1. Invasion  of the database

Statement:

  • Release of leaked information about members of the Russian military, the Central Bank of Russia, Roscosmos, oil and gas companies (Gazregion, Gazprom, Technotec), property management company Sawatzky, broadcaster VGTRK, IT company NPO VS, law firms, etc.
  • Tampering and deleting of hacked files

Fowler said Anonymous claimed to have hacked more than 2,500 Russian and Belarusian websites. In some cases, the stolen data was leaked online in volumes so large that it took years to review, he said. “The biggest development will be the vast amount of records that are captured, encrypted or leaked online,” Fowler said.

rwbj6hRr fGbKDY6iyYCzv3fjOzdo5b3shCkrKIFwYyineX4u4d0HRGJbBBh8keei0YbRQW vQeisV8umuXnMVfC3fMyRFioftnIQIaeEJupvFlaKPoLyVH WWZuuvnpPL1q0grLlGvJpdu9rpVZ4g

Shmur Tikhun, a security researcher at threat intelligence firm Cyberint, also believes the amount of data leaked is “huge.” “We don’t even know what to do with all this information at the moment because we didn’t expect to get it in such a short period of time,” he said.

2. Attacks on companies that continue to do business in Russia

statement:

  • Block websites of companies identified as continuing to do business in Russia
  • Leaked 10GB of emails, passwords and other data belonging to Swiss food company Nestle. Nestlé said the claims were “unsubstantiated”.

In late March, a Twitter account called @YourAnonTV began posting the logos of companies it said were still doing business in Russia, with one post issuing an ultimatum to withdraw from Russia within 48 hours and threatening “or you will become Our target.”

1BVjkUcjsu0ERkbaZFGTZpb4Wod0v1 qD9SxW1fpPgg2CjwXzm2JlSwpDoonFbuCfyejlVogXK8jfylbBHU01ijrwiO9w82tN14XgmaPEzNmYiNSE4BhCN

By attacking these companies, hacker activists are increasing the financial risk of continuing to operate in Russia. “By tracking their data or disrupting their business, companies are at risk for much more than lost sales and some negative PR,” Fowler said.

3. Block websites

statement:

  • Block Russian and Belarusian websites
  • Internet outages at the St. Petersburg International Economic Forum delayed Russian President Vladimir Putin’s keynote speech by about 100 minutes

A distributed denial of service (DDoS) attack works by flooding a website with enough traffic to take it offline. A basic defense against such attacks is “geolocation blocking” of foreign IP addresses. By hacking Russian servers, Anonymous allegedly bypassed these defenses, Fowler said.

luca bravo XJXWbfSo2f0 unsplash result

Contrary to popular belief, DDoS attacks are more than just minor inconveniences, says Fowler, “the owners of hacked servers are often unaware that their resources are being used to launch attacks on other servers and websites.” “During an attack, critical applications become unavailable and operations and production cease entirely. When services that governments and the public depend on become unavailable, there are financial and operational implications,” he said.

4. Training  newcomers

statement:

  • Train people how to launch DDoS attacks and mask their identities
  • Cybersecurity assistance to Ukraine

Fowler said training new members allows Anonymous to expand its reach, brand name and capabilities. People want to get involved but don’t know how, and Anonymous fills that void by training lower-level actors to do basic tasks, he said.

This allows skilled hackers to launch more advanced attacks, such as those of the NB65. NB65, a hacking group affiliated with Anonymous, claimed on Twitter in July that it used “Russian ransomware” to take control of the domain, email servers, and workstations of a manufacturing plant operated by Russian power company Leningradsky Metallichesky Zavod.

“It’s like in sports where the pros go to the World Cup and the amateurs go to smaller venues, but everyone plays,” Fowler said.

5. Hijacking media and streaming services

statement:

● Display of censored images and messages on TV broadcasts such as Russia 24, Channel 1, Moscow 24, Wink and Ivi

● Attacks targeting national holidays intensified, including the hacking of Russian video platform RuTube and smart TV channel listings on Russia’s “Victory Day” (May 9) and the Russian real estate federal agency Rosreestr on Ukraine’s “Constitution Day” (June 28)

The tactic was designed to directly undermine Russian censorship of the war, but Fowler said the messages would only resonate with “those who want to hear it.” Those Russian citizens may already be using VPNs to bypass Russian censorship; others have been imprisoned or have chosen to leave Russia.

6. Direct contact with Russians

statement:

  • Hacked printers and altered grocery receipts to print anti-war and pro-Ukrainian messages
  • Send millions of calls, emails and texts to Russian citizens
  • Send messages to users on the Russian social networking site VK

Of all the strategies, “this one is the most creative,” Fowler said, but those campaigns are winding down. Fowler said that so far, his research has not found any reason to doubt Anonymous’ claims.

How effective is “Anonymous”?

“The methods used by Anonymous against Russia are not only highly disruptive and effective but also rewrite the rules of how crowdsourced modern cyber warfare is conducted,” Fowler said. He said information gleaned from the database leak could reveal Criminal activity and “who is matching and where the money is going”.

However, security researcher Shmur Tikhon said most of the information is in Russian, and cyber experts, governments, hacker activists and everyday enthusiasts may scrutinize the data, but not as much as one might think.

Tijon also said he did not think criminal proceedings were likely. “A lot of the people who were hacked were sponsored by the Russian government, and I don’t think these people will be arrested any time soon,” he said. However, Tikhon said the leaks did go hand in hand.

Fowler echoed that sentiment, saying that once the network was infiltrated, the system would “fall like dominoes.” Hackers also often rely on other people’s leaks, a situation that Tikhon calls “a means of making a living” for the way they work. “This could be the start of a massive campaign that will come later,” he said.

A more immediate consequence of the hacking, Fowler and Tihon agreed, is that Russia’s cybersecurity defenses have been revealed to be far weaker than previously thought. However, Tikhon added that Russia’s offensive cyber capabilities are strong. “We expect the Russian government to show greater strength, at least in terms of their strategic assets such as banks and TV channels, especially government entities,” Tikhon said.

Fowler said that “Anonymous” lifted the veil on Russia’s cybersecurity practices, which “embarrassed and frustrated the Kremlin.”

Tags: Application SecurityData SecurityHacker-Attack-and-DefenseVulnerabilitywebsite security

Related Posts

protect your smart home
Hacking stories

How to protect your Smart Home from hackers

by BlockIsTheNewChain
September 4, 2022

Nowadays, many people have a lot of smart home devices in their homes. Maybe you have a lot of questions...

Read more
Investment scammers

Investment scammers target dating app users

August 3, 2022
Axie-Infinity-AXS-Metaverse

Hacking Story: How a fake job offer took down the world’s most popular crypto game?

August 3, 2022

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

  • Vulnerability Scanning

    The most popular Web vulnerability scanning tools

    36 shares
    Share 14 Tweet 9
  • Excellent blockchain API for developers

    29 shares
    Share 12 Tweet 7
  • 6 ways the hacker group Anonymous is waging cyber-war against Russia

    31 shares
    Share 12 Tweet 8
  • The application of blockchain technology in the healthcare industry

    35 shares
    Share 14 Tweet 9
  • Trends in fintech in 2022: The future of cryptocurrencies and blockchain

    39 shares
    Share 16 Tweet 10

  • About
  • terms-and-conditions
  • Privacy & Policy
  • Contact

© 2022 Blockisthenewchain - The latest Blockchain, Cybersecurity News, and Startup Reviews by BLOCKisthenewCHAIN.

No Result
View All Result
  • Home
  • Cybersecurity
  • Hacking stories
  • News
  • Blockchain
  • Startups

© 2022 Blockisthenewchain - The latest Blockchain, Cybersecurity News, and Startup Reviews by BLOCKisthenewCHAIN.

Welcome Back!

Sign In with Facebook
Sign In with Google
OR

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.