{"id":18431,"date":"2022-03-04T10:45:13","date_gmt":"2022-03-04T18:45:13","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/03\/04\/news-12164\/"},"modified":"2022-03-04T10:45:13","modified_gmt":"2022-03-04T18:45:13","slug":"news-12164","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/03\/04\/news-12164\/","title":{"rendered":"Hacktivists Stoke Pandemonium Amid Russia\u2019s War in Ukraine"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/621d576f70181659540c7de1\/master\/pass\/security-hacktivists-1238821241.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 03 Mar 2022 22:56:10 +0000<\/strong><\/p>\n<p class=\"BylineWrapper-iiTsTb hAGfXd byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb UCAzg byline__name\"><a class=\"BaseWrap-sc-TURhJ BaseText-fFzBQt BaseLink-gZQqBA BylineLink-eZnyPI eTiIvU mEZDb fNdcwQ bKZMMS byline__name-link button\" href=\"\/author\/lily-hay-newman\">Lily Hay Newman<\/a><\/span><\/span><\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p>To revist this article, visit My Profile, then <a href=\"\/account\/saved\">View saved stories<\/a>.<\/p>\n<p><span class=\"lead-in-text-callout\">on thursday, hackers<\/span> defaced a Russian Space Research Institute website and <a data-offer-url=\"https:\/\/www.vice.com\/en\/article\/z3n8ea\/hackers-breach-russian-space-research-institute-website\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.vice.com\/en\/article\/z3n8ea\/hackers-breach-russian-space-research-institute-website&quot;}\" href=\"https:\/\/www.vice.com\/en\/article\/z3n8ea\/hackers-breach-russian-space-research-institute-website\" rel=\"nofollow noopener\" target=\"_blank\">leaked files<\/a> that they allege are stolen from Roscosmos, the Russian space agency. Their <a data-offer-url=\"https:\/\/web.archive.org\/web\/20220303052232\/http:\/\/uv.ikiweb.ru\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/web.archive.org\/web\/20220303052232\/http:\/\/uv.ikiweb.ru\/&quot;}\" href=\"https:\/\/web.archive.org\/web\/20220303052232\/http:\/\/uv.ikiweb.ru\/\" rel=\"nofollow noopener\" target=\"_blank\">message<\/a>? \u201cLeave Ukraine alone else Anonymous will f*ck you up even more.\u201d Meanwhile <a data-offer-url=\"https:\/\/twitter.com\/DougMadory\/status\/1499397229164957715\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/DougMadory\/status\/1499397229164957715&quot;}\" href=\"https:\/\/twitter.com\/DougMadory\/status\/1499397229164957715\" rel=\"nofollow noopener\" target=\"_blank\">a DDoS attack<\/a> pummeled Russia&#x27;s .ru \u201ctop level domain,\u201d with the aim of essentially cutting off access to all URLs that end in .ru. These are just the latest incidents in a surge of hacktivism in support of Ukraine.<\/p>\n<p class=\"paywall\">Protests against Russia\u2019s war of choice with Ukraine have been held around the world, including in 48 Russian cities. The global community has <a href=\"https:\/\/www.wired.com\/story\/ukraine-russia-cryptocurrency-donations-hacktivism\/\">raised millions of dollars<\/a> for Ukraine through cryptocurrency donations, and private companies from Shell and BP to Apple have temporarily or permanently <a href=\"https:\/\/www.wired.com\/story\/apple-russia-iphone-ukraine-traffic-maps-rt-sputnik-app-store\/\">pulled out of the Russian market<\/a>. Amidst the havoc, hacktivists are joining the cacophony in an attempt to make a statement and advance their cause.<\/p>\n<p class=\"paywall\">For years, Russia has barraged Ukraine with an <a href=\"https:\/\/www.wired.com\/story\/russian-hackers-attack-ukraine\/\">array<\/a> of intrusive and <a href=\"https:\/\/www.wired.com\/story\/notpetya-cyberattack-ukraine-russia-code-crashed-the-world\/\">destructive<\/a> cyberattacks. And the war opened in recent days with Russian campaigns to hit Ukrainian institutions with DDoS attacks and awaken data-wiping malware on hundreds of Ukrainian computers. Ukraine itself has launched an effort to <a href=\"https:\/\/www.wired.com\/story\/ukraine-it-army-russia-war-cyberattacks-ddos\/\">amass a volunteer \u201cIT Army\u201d<\/a> of civilian hackers from around the world to aid its fight, alongside traditional conscription. Still, as the back-and-forth has escalated into violence in the region and NATO countries have battered Russia with crippling economic sanctions, hacktivist data leaks, website defacements, and cyberattacks have become one of the most visible, if not necessarily the most impactful, digital battlegrounds.<\/p>\n<p class=\"paywall\">The mix of hacktivism and active warfare creates a messy picture, experts say. Some caution that hacktivism could lead to unintended escalations or endanger intelligence operations. Others argue that <a href=\"https:\/\/www.wired.com\/story\/hacktivism-sudan-ddos-protest\/\">even more than in peacetime<\/a>, periods of active combat render hacktivism ineffectual and largely just distracting.<\/p>\n<p class=\"paywall\">\u201cIt&#x27;s a high-intensity armed conflict between two states with heavy\u00a0kinetic warfare, civilian casualties, and physical destruction,\u201d says Lukasz Olejnik, an independent cybersecurity researcher and former\u00a0cyberwarfare\u00a0advisor\u00a0to the International Committee of the Red Cross. \u201cLet&#x27;s be honest here, what may hacktivism change in this picture? Besides, most of the reports of hacktivism are unverifiable at best. They are highly amplified on social media and traditional electronic media, but what is the actual effect?\u201d<\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Gregory Barber<\/span> and <span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Matt Simon<\/span><\/span><\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Garrett M. Graff<\/span><\/span><\/p>\n<p class=\"BylineWrapper-iiTsTb gRgFYc byline bylines__byline\" data-testid=\"BylineWrapper\" itemprop=\"author\" itemtype=\"http:\/\/schema.org\/Person\"><span itemprop=\"name\" class=\"BylineNamesWrapper-dbkCxf erRIa-D\"><span data-testid=\"BylineName\" class=\"BylineName-cKXFOb irUMly byline__name\">Reece Rogers<\/span><\/span><\/p>\n<p class=\"paywall\">If nothing else, the hacktivist efforts have been very visible. As Russia began its invasion of Ukraine on Thursday, the hacking collective Anonymous <a data-offer-url=\"https:\/\/twitter.com\/YourAnonOne\/status\/1496965766435926039?\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/YourAnonOne\/status\/1496965766435926039?&quot;}\" href=\"https:\/\/twitter.com\/YourAnonOne\/status\/1496965766435926039?\" rel=\"nofollow noopener\" target=\"_blank\">tweeted<\/a> that it was \u201cofficially in cyber war against the Russian government.\u201d The group claimed credit for attacks that briefly knocked out access to a number of sites, including that of the state-controlled Russian news agency RT, Russian oil giant Gazprom, the Kremlin itself, and other Russian government agencies. A marine tracking data defacement resulted in Putin\u2019s yacht being renamed &quot;FCKPTN\u201d in maritime tracking data. Soon after, two groups, known as \u201cAnonymous Liberland\u201d and \u201cthe Pwn-B\u00e4r Hack,\u201d <a data-offer-url=\"https:\/\/twitter.com\/LatestAnonPress\/status\/1497515581268021251?s=20&amp;t=7SIqC1UQKlK_nSjSEYAuYw\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/LatestAnonPress\/status\/1497515581268021251?s=20&amp;t=7SIqC1UQKlK_nSjSEYAuYw&quot;}\" href=\"https:\/\/twitter.com\/LatestAnonPress\/status\/1497515581268021251?s=20&amp;t=7SIqC1UQKlK_nSjSEYAuYw\" rel=\"nofollow noopener\" target=\"_blank\">leaked<\/a> roughly 200 gigabytes worth of alleged emails from the Belarusian weapons manufacturer Tetraedr.<\/p>\n<p class=\"paywall\">On Monday, the collective claimed another wave of website defacements, saying it had posted anti-war overlays on a number of news websites, including that of the Russian newspaper <em>Kommersant<\/em> and the state-run outlets TASS and RIA Novosti.<\/p>\n<p class=\"paywall\">Hacktivist activity predates the actual war. A group known as the Belarusian Cyber Partisans <a href=\"https:\/\/www.wired.com\/story\/belarus-railways-ransomware-hack-cyber-partisans\/\">attacked Belarus&#x27; railway system<\/a> at the end of January and recently claimed to be at it again. The goal of the original initiative was to slow Russia&#x27;s troop buildup along Ukrainian borders; this week the group said it wanted to disrupt Russian military movement.<\/p>\n<p class=\"paywall\">\u201cWe continue to help Ukrainians in their fight against Russian occupation forces,\u201d the group <a data-offer-url=\"https:\/\/twitter.com\/cpartisans\/status\/1497930273425661958\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/cpartisans\/status\/1497930273425661958&quot;}\" href=\"https:\/\/twitter.com\/cpartisans\/status\/1497930273425661958\" rel=\"nofollow noopener\" target=\"_blank\">tweeted<\/a> on Sunday. \u201cThe Railways is under attack. \u2026 Manual control mode is enabled, which will slow down the movement of trains but will NOT create emergency situations. It will NOT endanger ordinary citizens!\u201d<\/p>\n<p class=\"paywall\">Cyber Partisans spokesperson Yuliana Shemetovets told WIRED that the group has grown in recent weeks. \u201cFive new people, Belarusians, joined the group since the war started,\u201d she said. \u201cMore are on the list to be verified.\u201d<\/p>\n<p class=\"paywall\">Meanwhile, the Conti and CoomingProject ransomware groups declared their allegiance to Russia last week. Soon after, more than 60,000 of Conti&#x27;s internal messages leaked, along with the message \u201cGlory to Ukraine!\u201d The trove, presumably leaked by Conti affiliates, reveals details about how the group is organized and how it operates. On Wednesday, Conti <a data-offer-url=\"https:\/\/twitter.com\/radvadva\/status\/1499100075859103748\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/twitter.com\/radvadva\/status\/1499100075859103748&quot;}\" href=\"https:\/\/twitter.com\/radvadva\/status\/1499100075859103748\" rel=\"nofollow noopener\" target=\"_blank\">seemed to be dismantling its infrastructure<\/a>, evidence of the impacts hacktivism can have, regardless of whether such protests directly shape the course of the war.<\/p>\n<p class=\"paywall\">On Thursday, security researchers at Trustwave SpiderLabs also <a data-offer-url=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/dark-web-insights-evolving-cyber-tactics-aim-to-impact-the-russia-ukraine-conflict\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/dark-web-insights-evolving-cyber-tactics-aim-to-impact-the-russia-ukraine-conflict\/&quot;}\" href=\"https:\/\/www.trustwave.com\/en-us\/resources\/blogs\/spiderlabs-blog\/dark-web-insights-evolving-cyber-tactics-aim-to-impact-the-russia-ukraine-conflict\/\" rel=\"nofollow noopener\" target=\"_blank\">published<\/a> findings that a pro-Russia entity, JokerDNR, has been publishing blog posts aimed at embarrassing Ukrainian officials and even claiming to dox some Ukrainian government workers and military members by publishing alleged names, addresses, and other contact information.\u00a0<\/p>\n<p class=\"paywall\">A number of security companies and other organizations have released free versions of digital defense tools or expanded their <a data-offer-url=\"https:\/\/www.cisa.gov\/free-cybersecurity-services-and-tools\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.cisa.gov\/free-cybersecurity-services-and-tools&quot;}\" href=\"https:\/\/www.cisa.gov\/free-cybersecurity-services-and-tools\" rel=\"nofollow noopener\" target=\"_blank\">free offerings<\/a> to help Ukrainians defend their networks. Google, for example, says its human rights-focused DDoS protection service Project Shield is now <a data-offer-url=\"https:\/\/support.projectshield.withgoogle.com\/s\/article\/How-to-apply-for-Project-Shield?language=en_US\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/support.projectshield.withgoogle.com\/s\/article\/How-to-apply-for-Project-Shield?language=en_US&quot;}\" href=\"https:\/\/support.projectshield.withgoogle.com\/s\/article\/How-to-apply-for-Project-Shield?language=en_US\" rel=\"nofollow noopener\" target=\"_blank\">in use<\/a> by more than 150 Ukrainian websites.<\/p>\n<p class=\"paywall\">Hacktivists aren&#x27;t the only ones leaking data left and right. On Tuesday, the Ukrainian newspaper <a data-offer-url=\"https:\/\/www.pravda.com.ua\/news\/2022\/03\/1\/7327081\/\" class=\"external-link\" data-event-click=\"{&quot;element&quot;:&quot;ExternalLink&quot;,&quot;outgoingURL&quot;:&quot;https:\/\/www.pravda.com.ua\/news\/2022\/03\/1\/7327081\/&quot;}\" href=\"https:\/\/www.pravda.com.ua\/news\/2022\/03\/1\/7327081\/\" rel=\"nofollow noopener\" target=\"_blank\"><em>Pravda<\/em> published<\/a> a trove of personal data allegedly identifying roughly 120,000 Russian soldiers deployed in Ukraine. And Ukraine&#x27;s IT Army has been working to employ some hacktivist techniques in a more organized and strategic way.<\/p>\n<p class=\"paywall\">\u201cDDoS is all well and good, but it&#x27;s a blunt instrument,&quot; an IT Army participant who goes by the handle \u201cNovember\u201d tells WIRED. &quot;We wish to be more precise, carefully selecting our targets and avoiding any collateral damage to the livelihood and well-being of the Russian citizenry. Our primary concern is in countering Russian disinformation on the conflict, by any means possible, and providing quality open-sourced intelligence in an effort to preserve Ukrainian lives.\u201d<\/p>\n<p class=\"paywall\">In a situation like the invasion of Ukraine, hacktivism could do more harm than good. Some researchers note that a worst-case scenario of hacktivism would be an incident or series of attacks that inadvertently escalates a conflict or is used as a pretext for escalation by one side or the other.<\/p>\n<p class=\"paywall\">Additionally, by calling attention to the cybersecurity shortcomings of high-sensitivity networks and digital platforms, hacktivists could inadvertently expose friendly intelligence forces already lurking there.<\/p>\n<p class=\"paywall\">\u201cHacktivism by its very nature is always loud, and intelligence by its nature is usually quiet,\u201d says incident responder and former NSA hacker Jake Williams. \u201cWell-meaning hacktivists being loud may unwittingly lead security forces to intelligence operation that may have been ongoing in that network and flying under the radar. So they&#x27;re essentially outed and lose access because of an investigation into a hacktivist attack.\u201d<\/p>\n<p class=\"paywall\">Some hacking tools used by that intelligence force may also be exposed in such a situation, rendering them less useful.<\/p>\n<p class=\"paywall\">Williams adds that when spies lose access to information they want or need during a combat situation, they are forced to try to reestablish that access however they can. To get the job done quickly, individuals may take greater risks of exposing themselves or use hacking tools that could later be exposed.<\/p>\n<p class=\"paywall\">\u201cWhen there are boots on the ground, when there are bullets flying, it absolutely changes the calculus on whether hacktivism is a net positive,\u201d he says. \u201cAll that said, if I were Ukrainian I would probably be hacking the hell out of Russian stuff, and I could care less about the West\u2019s long-term intelligence capability.\u201d<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/hacktivists-pandemonium-russia-war-ukraine\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/621d576f70181659540c7de1\/master\/pass\/security-hacktivists-1238821241.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Thu, 03 Mar 2022 22:56:10 +0000<\/strong><\/p>\n<p>A wave of cyberattacks meant to make a statement and particularly buoy Ukraine could have unintended consequences.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21358],"class_list":["post-18431","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-cyberattacks-and-hacks"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18431","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18431"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18431\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18431"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18431"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18431"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}