Anonymous and Ukraine IT Army continue to target Russian entities

The Anonymous collective and the volunteer group Ukraine IT Army continues to launch cyber attacks on Russian entities.

The Anonymous collective continues its cyber war on Russian businesses and government organizations. Below is the list of the most recent organizations targeted by the collective that also leaked stolen data through the DDoSecrets platform:

CorpMSP is a federal institution providing support to small and medium-sized businesses. The controlling shareholder of CorpMSP is the Russian Federation. According to group of hacktivist NB65, CorpMSP is allegedly used as a shell company for digital spies, and supports operations of the Russian Ministry of Defense. The leaked files documented these allegations, they were quickly removed from Mega. According to NB65, the 9GB of files included client contracts and image files of the Ministry of Defense contracts. The Anonymous-linked group leaked a 482.5 GB archive containing 75,000 files, emails and disk images from CorpMSP. LLC Capital is a specialized accounting firm which works with Mikhail Gutseriev’s SAFMAR Group and its assets, including PJSC RussNeft. Anonymous leaked a 20.4 GB archive containing 31,990 emails from LLC Capital.

CorpMSP is a naughty group of IT people.

You have 3 days to contact us. We have 675GB of data.

How many of your clients and government contracts are going to stick around once they learn you’re completely owned by Network Battalion 65?

Let’s find out.

Fuck your president. pic.twitter.com/G41KkmUm96

— NB65 (@xxNB65) April 25, 2022

JUST IN: #Anonymous-linked group ‘NB65’ (@xxNB65) hacked over 480 GB and 75,000 files, emails and disk images from CorpMSP, a federal institution providing support to small and medium-sized businesses. The controlling shareholder of CorpMSP is the Russian Federation. #OpRussia pic.twitter.com/r3tMdMlKSF

— Anonymous TV (@YourAnonTV) May 5, 2022

Anonymous is also working to inform Russians about the crimes committed by its Army in the barbarian invasion of Ukraine. The hacking group @squad3o3 claimed that over 100 million messages have been sent from its services to Russia to fight Moscow’s propaganda.

JUST IN: The amazing @squad3o3 continues to provide a way to send messages to Russian about the war in #Ukraine to fight Russian propaganda. Over 100 million messages sent so far from warriors all over the world. #OpRussia #Anonymous https://t.co/4xFYx4sfHS pic.twitter.com/GyjPgjkEgU

— Anonymous TV (@YourAnonTV) May 2, 2022

This week the collective of hacktivists Ukraine IT Army has launched a series of massive DDoS attacks on Russian targets causing severe problems. Once of the targets of the attack was the Unified State Automated Alcohol Accounting Information System (EGAIS) portal, which is considered crucial for alcohol distribution in Russia.

The attacks on the EGAIS websites took place on May 2 and 3 and failures were reported on 4, a call to action to attack the site was shared within the community of IT Army of Ukraine.

Due to the effects of the attack, factories cannot accept tanks with alcohol, and customers (both stores and distributors) were not able to receive finished products that have already been delivered to them,

Many factories halted shipments to warehouses completely and subsequently cut their production rate.

This week Crowdstrike researchers reported that Pro-Ukraine hackers, likely linked to Ukraine IT Army, are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media agencies. The DDoS attacks also targeted three Lithuanian media websites.

The attackers attempt to exploit misconfigured Docker installs through exposed APIs and takeover them to abuse their computational resources.

Follow me on Twitter: @securityaffairs and Facebook

Pierluigi Paganini

(SecurityAffairs – hacking, Ukraine)

The post Anonymous and Ukraine IT Army continue to target Russian entities appeared first on Security Affairs.

Recent Posts
Contact Us

We're not around right now. But you can send us an email and we'll get back to you, asap.

Not readable? Change text. captcha txt