Hacking

Anonymous #OpRussia Thousands of sites hacked, data leaks and more

Anonymous and its affiliates continue to target Russia and Belarus, it is also targeting the Russian disinformation machine.

Anonymous announced to have hacked more than 2,500 websites linked to the Russian and Belarusian governments, state-owned media outlets spreading disinformation, Russian private organizations, banks, hospitals, airports. The attacks were conducted as part of the #OpRussia launched by the collective after the violent and illegitimate invasion of Ukraine.

The popular collective, along with white hat hackers and researchers who responded to the call to arms against Russia, also targeted prominent cybercrime gangs that announced their support for Moscow. Pro-Ukraine hackers leaked thousands of internal chats from the Conti ransomware group along with the source code for their malware.

A few hours ago, the Anonymous-linked group ATW announced to have breached and leaked the database of the Russian energy corporation giant Gazprom.

Anonymous also leaked database of the Russian Government website [http://gov.ru], which includes subdomains and back-end IPs for for every server, and the website of the Ministry of Economic Development of Russia.

The list of targeted entities is long, it includes the official website of the Government of the Republic of Crimea (http://rk.gov.ru), the Russian Space Agency “Roscosmos” website.

One of the most clamorous leaks announced this leak is related to documents allegedly stolen from Russian troops that demonstrate the planning of Moscow for this war. The war plan was was approved on 18th January, and the initial plan was to occupy Ukraine within March 6.

“Anonymous publicly spread on its social network channels the alleged invasion plans by Moscow in Ukraine. According to the hackers, the attack was reportedly approved on January 18th, 2022 and included a blitzkrieg from February 20th to March 6th.” reported Avionews. “The activists have also made available to everyone geographical maps and strategic files written in Cyrillic language and belonging to the Black Sea Fleet of the Russian Navy. At the moment it has not been possible to verify the authenticity of the published documents, therefore the reliability of the source remains difficult to verify.” 

Anonymous also attempted to support military operations on the field by hacking into IP cameras that were used to monitor the movements of Ukrainians.

#Russian IP cameras were put in place to monitor #Ukrainian movements. We made sure to lock the Russians out of their own little spying devices by changing their default passwords and knocking their stuff offline” was the message published by the collective on Twitter.

Anonymous will continue to support Ukraine against the invaders …. stay tuned!

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Anonymous)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Nearly 5 Million Web Servers Found Exposing Git Metadata – Study Reveals Widespread Risk of Code and Credential Leaks

A study found nearly 5 million servers exposing Git metadata, with 250,000 leaking deployment credentials…

4 hours ago

U.S. CISA adds SmarterTools SmarterMail and React Native Community CLI flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds SmarterTools SmarterMail and React Native Community CLI…

5 hours ago

Hacker claims theft of data from 700,000 Substack users; Company confirms breach

Substack confirmed a data breach after a hacker leaked data from nearly 700,000 users, including…

18 hours ago

Pro-Russian group Noname057(16) launched DDoS attacks on Milano Cortina 2026 Winter Olympics

Italy stopped Russian-linked cyberattacks targeting Foreign Ministry offices and Winter Olympics websites and hotels, Foreign…

23 hours ago

China-linked Amaranth-Dragon hackers target Southeast Asian governments in 2025

China-linked hackers tracked as Amaranth-Dragon targeted government and law enforcement agencies across Southeast Asia in…

1 day ago

CVE-2025-22225 in VMware ESXi now used in active ransomware attacks

Ransomware groups now exploit VMware ESXi vulnerability CVE-2025-22225, patched by Broadcom in March 2025. The…

2 days ago

This website uses cookies.