Anonymous and the IT ARMY of Ukraine continue to target Russian entities
The popular hacking Anonymous and the IT ARMY of Ukraine continue to target Russian government entities and private businesses.
This week Anonymous claimed to have hacked multiple private businesses and leaked their data through the DDoSecrets platform.
The list of recently compromised businesses includes:
- Forest – The hacktivists leaked 37,500 emails stolen from the company which is a Russian logging and wood manufacturing firm.
- Aerogas – an engineering company that focuses in the oil and gas industry. Aerogas’ clients include Rosneft, NOVATEK, Volgagaz, Purneft, and others. The hacktivists have leaked approximately 100,000 emails from Aerogas.
- Petrofort – Petrofort is one of the largest office spaces and business centers in Saint Petersburg. The hackers have leaked approximately 300,000 emails from Petrofort.
The group of hackers known as The Black Rabbit World (@Thblckrbbtworld) who operates under the Anonymous umbrella claimed to have gained access to the CCTV system and the Kremlin. Below the message the published online:
“We won’t stop until we reveal all of your secrets. You won’t be able to stop us. “Now we’re inside the castle, Kremlin.”
This week the IT ARMY of Ukraine also announced the hack of Rossgram, a Russian version of Instagram, then the group of hacktivists created a fake Rossgram app.
Please vote for Security Affairs as the best European Cybersecurity Blogger Awards 2022 – VOTE FOR YOUR WINNERS
Vote for me in the sections “The Underdogs – Best Personal (non-commercial) Security Blog” and “The Tech Whizz – Best Technical Blog” and others of your choice.
To nominate, please visit: https://docs.google.com/forms/d/e/1FAIpQLSfxxrxICiMZ9QM9iiPuMQIC-IoM-NpQMOsFZnJXrBQRYJGCOw/viewform
Follow me on Twitter: @securityaffairs and Facebook
|
Pierluigi Paganini
(SecurityAffairs – hacking, Anonymous)
The post Anonymous and the IT ARMY of Ukraine continue to target Russian entities appeared first on Security Affairs.
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.