Anonymous and Ukraine IT Army continue to target Russian entities

Pierluigi Paganini May 06, 2022

The Anonymous collective and the volunteer group Ukraine IT Army continues to launch cyber attacks on Russian entities.

The Anonymous collective continues its cyber war on Russian businesses and government organizations. Below is the list of the most recent organizations targeted by the collective that also leaked stolen data through the DDoSecrets platform:

  • CorpMSP is a federal institution providing support to small and medium-sized businesses. The controlling shareholder of CorpMSP is the Russian Federation. According to group of hacktivist NB65, CorpMSP is allegedly used as a shell company for digital spies, and supports operations of the Russian Ministry of Defense. The leaked files documented these allegations, they were quickly removed from Mega. According to NB65, the 9GB of files included client contracts and image files of the Ministry of Defense contracts. The Anonymous-linked group leaked a 482.5 GB archive containing 75,000 files, emails and disk images from CorpMSP.
  • LLC Capital is a specialized accounting firm which works with Mikhail Gutseriev’s SAFMAR Group and its assets, including PJSC RussNeft. Anonymous leaked a 20.4 GB archive containing 31,990 emails from LLC Capital.

Anonymous is also working to inform Russians about the crimes committed by its Army in the barbarian invasion of Ukraine. The hacking group @squad3o3 claimed that over 100 million messages have been sent from its services to Russia to fight Moscow’s propaganda.

This week the collective of hacktivists Ukraine IT Army has launched a series of massive DDoS attacks on Russian targets causing severe problems. Once of the targets of the attack was the Unified State Automated Alcohol Accounting Information System (EGAIS) portal, which is considered crucial for alcohol distribution in Russia.

The attacks on the EGAIS websites took place on May 2 and 3 and failures were reported on 4, a call to action to attack the site was shared within the community of IT Army of Ukraine.

Due to the effects of the attack, factories cannot accept tanks with alcohol, and customers (both stores and distributors) were not able to receive finished products that have already been delivered to them,

Many factories halted shipments to warehouses completely and subsequently cut their production rate.

This week Crowdstrike researchers reported that Pro-Ukraine hackers, likely linked to Ukraine IT Army, are using Docker images to launch distributed denial-of-service (DDoS) attacks against a dozen websites belonging to government, military, and media agencies. The DDoS attacks also targeted three Lithuanian media websites.

The attackers attempt to exploit misconfigured Docker installs through exposed APIs and takeover them to abuse their computational resources.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Ukraine)

[adrotate banner=”5″]

[adrotate banner=”13″]

you might also like

leave a comment