• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

ShadowLeak: Radware Uncovers Zero-Click Attack on ChatGPT

 | 

SonicWall warns customers to reset credentials after MySonicWall backups were exposed

 | 

CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

 | 

Jaguar Land Rover will extend its production halt into a third week following a cyberattack

 | 

China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

 | 

Microsoft and Cloudflare teamed up to dismantle the RaccoonO365 phishing service

 | 

DoJ resentenced former BreachForums admin to three years in prison

 | 

Apple backports fix for actively exploited CVE-2025-43300

 | 

New supply chain attack hits npm registry, compromising 40+ packages

 | 

Cybercrime group accessed Google Law Enforcement Request System (LERS)

 | 

China-linked Mustang Panda deploys advanced SnakeDisk USB worm

 | 

Insider breach at FinWise Bank exposes data of 689,000 AFF customers

 | 

Hackers steal millions of Gucci, Balenciaga, and Alexander McQueen customer records

 | 

Fairmont Federal Credit Union 2023 data breach impacted 187K people

 | 

UK ICO finds students behind majority of school data breaches

 | 

INC ransom group claimed the breach of Panama’s Ministry of Economy and Finance

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 62

 | 

Security Affairs newsletter Round 541 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

ShinyHunters Attack National Credit Information Center of Vietnam

 | 

FBI warns of Salesforce attacks by UNC6040 and UNC6395 groups

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Malware
  • GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec

GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec

Pierluigi Paganini February 06, 2014

New slides leaked by Snowden, and published by NBC NEWS, reveal that GCHQ ran DoS attack on chatrooms used by Anonymous and LulzSec.

The last revelation on the investigation conducted by NBC News on Snowden case reveals that British intelligence GCHQ ran denial-of-service attacks against Anonymous and LulzSec. Documents leaked by the NSA whistleblower Edward Snowden reports the existence of a GCHQ unit known as the Joint Threat Research Intelligence Group (JTRIG) that ran DoS attack against chatrooms used by hacktivists. It is the first time that is mentioned the secret unit, the existence of JTRIG has never been previously disclosed publicly.

The leaked slides contains a dedicated page that mentions the Rolling Thunder operation operated by JTRIG, the document erroneously reports a “DDoS” attack instead a DoS.

NBC slides Rolling thunder

The state-sponsored hackers hit Anonymous and LulzSec, the offensive campaign was codenamed  Rolling Thunder, the attackers used a packet flood technique to break down the adversaries.

“The documents, from a PowerPoint presentation prepared for a 2012 NSA conference called SIGDEV, show that the unit known as the Joint Threat Research Intelligence Group, or JTRIG, boasted of using the DDOS attack – which it dubbed Rolling Thunder — and other techniques to scare away 80 percent of the users of Anonymous internet chat rooms.” NBC reports.

GCHQ spies also infiltrated the chat rooms for Intelligence purpose, the British agents in this way have identified a hacktivist who has stolen confidential data from PayPal and also another member who had participated in attacks against government websites.

Intelligence sources in the past referred that in 2011, authorities were alarmed by a wave of cyber attacks on government and corporate websites, so they decided to go on the attack.

“While there must of course be limitations,”  “law enforcement and intelligence officials must be able to pursue individuals who are going far beyond speech and into the realm of breaking the law: defacing and stealing private property that happens to be online.” “No one should be targeted for speech or thoughts, but there is no reason law enforcement officials should unilaterally declare law breakers safe in the online environment,” said Michael Leiter, the former head of the U.S. Government’s National Counterterrorism Center and now an NBC News analyst.

The GCHQ offensive operation started in September 2011, in that period, both groups LulzSec and Anonymous were very active, in December of the same year Anonymous group violated the systems of Stratfor Intelligence firm. Hacktivists from collectives LulzSec ran a DDoS attack on the website of the Serious and Organised Crime Agency in June 2011 and on the US Central Intelligence Agency. LulzSec had also hacked InfraGard chapters’ websites, a non-profit organization linked to the FBI, email and database were leaked during the attack. Always in the same period the hacktivists bombarded website Senate.gov stealing internal data, and within the #OpPayback the hit PayPal and Mastercard websites who were guilty to block WikiLeaks banking transfers in 2010.

The presentation gives detailed examples of “humint” (human intelligence) on a collective of hacktivists known with pseudonymous G-Zero, Topiary and pOke, they were contacted by undercover GCHQ agents via IRC. 

All the chat session were recorded, following an extract of one of them:

“Anyone here have access to a website with at least 10,000+ unique traffic per day?” asks one hacktivist in a transcript taken from a conversation that began in an Operation Payback chat room. An agent responds and claims to have access to a porn website with 27,000 users per day. “Love it,” answers the hacktivist. The hackers ask for access to sites with traffic so they can identify users of the site, secretly take over their computers with malware and then use those computers to mount a DDOS attack against a government or commercial website. 

“In a transcript taken from a second conversation in an Operation Payback chat room, ahacktivist using the name “pOke” tells another named “Topiary” that he has a list of emails, phone numbers and names of “700 FBI tards.”

Edward Pearson is the person identified as GZero, a 25 year-old from York, who was convicted and sentenced to 26 months in prison for stealing information from 200,000 PayPal accounts. The investigators also discovered that Pearson and his then girlfriend used stolen credit card details to pay for a hotel stay. All the details of the investigation were reported in the leaked GCHQ presentation.

After the disclosure of the slides the advocates and security experts are questioning the legality of the operation ran by the GCHQ. Is it legal to hack back an attacker? What happens if the attacker is an intelligence agency and the target is the communication channel of a group of hacktivists like LulzSec and Anonymous?

Pierluigi Paganini
(Security Affairs –  GCHQ, Anonymous, LulzSec)

facebook linkedin twitter

Anonymous DOS G-Zero GCHQ Hacktivism Joint Threat Research Intelligence Group JTRIG LulzSec Snowden state sponsored hackers Topiary and pOke Wikileaks

you might also like

Pierluigi Paganini September 17, 2025
China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy
Read more
Pierluigi Paganini September 16, 2025
New supply chain attack hits npm registry, compromising 40+ packages
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    ShadowLeak: Radware Uncovers Zero-Click Attack on ChatGPT

    Hacking / September 18, 2025

    SonicWall warns customers to reset credentials after MySonicWall backups were exposed

    Data Breach / September 18, 2025

    CVE-2025-10585 is the sixth actively exploited Chrome zero-day patched by Google in 2025

    Uncategorized / September 18, 2025

    Jaguar Land Rover will extend its production halt into a third week following a cyberattack

    Security / September 18, 2025

    China-linked APT41 targets government, think tanks, and academics tied to US-China trade and policy

    APT / September 17, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT