Hacktivism

Anonymous hacked Russian Thozis Corp, but denies attacks on Rosaviatsia

The Anonymous collective hacked the Russian investment firm Thozis Corp, but it’s a mystery the attack against the Russian Civil Aviation Authority Rosaviatsia.

Anonymous continues to target Russian organizations and private foreign businesses the are still operating in the country. The popular collective claims to have hacked the Russian investment firm Thozis Corp, which is owned by the oligarch Zakhar Smushkin.

The hacktivists have stolen thousands of internal email and shared it with the data leak platform DDoSecrets. At this time 5,500 emails from Thozis Corp., were available online, some of them containing sensitive information about deals and investments of the firm.

“5,500 emails from Thozis Corp., a Russian investment firm owned by Zakhar Smushkin (number 2,674 on Forbes’ billionaire list), which is involved in the project to build the Yuzhny satellite city in Saint Petersburg.” states DDoSecrets. “One of the largest development projects in Russia, it was approved by the Russian government as a priority investment as part of the 2020 Strategy and receives government support.”

Anonymous continues to threaten international businesses that are still active in Russia and Belarus, recently Canadian oilfield services company Calfrac Well Services has suspended investments in the country canceled the supply of equipment, while Decathlon announced the closure of its stores in Russia.

However, in this tumultuous context, there is a high risk that some threat actors could abuse the name of Anonymous to carry out attacks never launched by the collective and conduct false flag operations.

Recently the Russian Civil Aviation Authority (Rosaviatsia) was hacked and attackers wiped 65 terabytes worth of data from the agency’s infrastructure.

Anonymous quickly denied the hacking of the Russian Civil Aviation Authority that released a statement to blaming the incident on the malfunction of the electronic document flow system and the lack of access to the internet.

“Due to temporary lack of access to Internet and malfunction of the electronic document flow system of Rosaviatsia the Federal Agency for Air Transport is switching to the paper version. The document flow procedure is being determined by the current records management instructions,” the translated statement published by IBTimes said. “Information exchange will be carried out via AFTN channel (for urgent short message) and postal mail. Please make this information available to all Civil Aviation Organizations,”

The agency did not confirm if the incident was carried out by threat actors, the AviationHerald reported that the attack hack in Rosaviasta was “presumably carried out by the Anonymous Hacking Group.” 

It is not clear how it is possible to erase a so huge volume of data accidentally.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Anonymous)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.