• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

China-linked group Houken hit French organizations using zero-days

 | 

Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

 | 

Europol shuts down Archetyp Market, longest-running dark web drug marketplace

 | 

Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

 | 

Cisco removed the backdoor account from its Unified Communications Manager

 | 

U.S. Sanctions Russia's Aeza Group for aiding crooks with bulletproof hosting

 | 

Qantas confirms customer data breach amid Scattered Spider attacks

 | 

CVE-2025-6554 is the fourth Chrome zero-day patched by Google in 2025

 | 

U.S. CISA adds TeleMessage TM SGNL flaws to its Known Exploited Vulnerabilities catalog

 | 

A sophisticated cyberattack hit the International Criminal Court

 | 

Esse Health data breach impacted 263,000 individuals

 | 

Europol dismantles €460M crypto scam targeting 5,000 victims worldwide

 | 

CISA and U.S. Agencies warn of ongoing Iranian cyber threats to critical infrastructure

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Canada bans Hikvision over national security concerns

 | 

Denmark moves to protect personal identity from deepfakes with new copyright law

 | 

Ahold Delhaize data breach affected over 2.2 Million individuals

 | 

Facebook wants access to your camera roll for AI photo edits

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 51

 | 

Security Affairs newsletter Round 530 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber warfare
  • Intelligence
  • Security
  • Critical infrastructures & manipulation of the name Anonymous

Critical infrastructures & manipulation of the name Anonymous

Pierluigi Paganini February 22, 2012

What are the main dangers for our infrastructures? Too much threats which any country is exposed. The situation is bleak, suddenly the sectors of defense found themselves vulnerable to cyber threats. Once nations shown their proud arms, flaunt power, intimidating opponents in this way. Today the way of fighting is radically changed, the battleground is cyberspace, the armies are composed by groups of hackers and cyber weapons are sophisticated weapons designed to attack strategic targets … mainly the wars today are silent. This last aspect is not negligible, country like China has started the warfare first of many other nations, the objectives of raids and of cyber operations of industrial espionage are often realized when the main damages had been already caused. In some cases we speak of a competitive advantage than a decade, we think the case study of Nortel and the damage caused by a decade of spying. The political landscape has radically changed, today countries like U.S., Japan and Russia are subject to the offensive of those nations once been relegated to marginal roles on the international stage. In mid July 2010, security experts discovered the virus called Stuxnet that had infiltrated computers inside nuclear plants and other infrastructures in country like Iran. It is considered “the first” cyber weapon of the history.

It is completely changed the way to conduct intelligence operations now moves through a meticulous analysis of the battlefield, Internet, studying the operations in the cyber space of opposing forces, nations and companies to spy.

Many aspects are profoundly changed, alliances that were once unimaginable has become reality today and they are able to frighten technologically advanced nations such as Israel and U.S.. For example let me cite China-Iran axis, or the support provided by China itself to nations like North Korea in offending military targets such as South Korea or Japan.
All this turmoil has the main effect of addressing significant capital in critical areas such as cyber defense to compensate cyber gap. Uncomfortable situation that governments tend to conceal and hide from its citizens, I live in Italy and if I go on the streets to ask ordinary people the cost of spending on warfare they will take me for a fool.
The awareness level on the topic is practically zero. The question remains how much effective are these measures and what is the level of security we are able to provide?  We are in an embryonic stage in which it is too early hazard a hypothesis about the real state in term of security of the critical infrastructures all over the world. Who is threaten our tranquility?

Main threats come from:

  • Hostile foreign states and cyber terrorism
  • Cyber ​​crime
  • Groups of hacktivists

The threat of cyber crime and those made ​​by the actions of protest of groups of hacktivists are sources of considerable concern. So far this year we have witnessed an escalation of the phenomenon of hacktivism, the Anonymous group seems to have upped the ante, between doubts and misgivings about the real genesis of operations, numerous attacks have been registered against government sites and security agencies.

Gen. Keith Alexander, current director of the National Security Agency warned regarding the possibility that groups of hacktivist will have the ability in short term to bring cyber attack to the national power supplies causing a limited power outage in the US..
Power supplies are just one possible target, don’t forget the critical of telecommunications systems, gas and oil storage and transportation, banking and finance, transportation, water supply systems and emergency services.  The profile of cyber assaults against US government and corporate targets is increasing manifesting high skill in the cyber strategy of the attacks.

If forces like those of hacktivist have the technical capacities and critical mass such that they can influencing foreign policy, are we sure that among their goals there are critical infrastructures?

Why the group that draws its strength from the masses should attack them, put them in danger? 

Does Anonymous want this?

In an official message to the Wall Street Journal Anonymous regarding the accusation has written

“Ridiculous! Why should Anonymous shut off power grid? Makes no sense! They just want to make you feel afraid.”

“Why would Anons shut off a power grid?” reads a tweet from the @YourAnonNews feed. “There are ppl on life support / other vital services that rely on it. Try again NSA. #FearMongering”

The researcher of the Mercatus Center at George Mason University, Jerry Brito, told that Anonymous has never made a threat to the electrical grid or to other critical infrastructure.
But then, why these rumors began to circulate in authoritative newspapers? More of the group itself I’m scared of misuse of the name Anonymous, someone using the causes of the hacktivists to create a climate of emergency, declare openly to the world that we are terribly vulnerable.
Maybe someone is convinced that scaring the public is possible to remove the masses from the ideology behind the staged protests. The sad aspect is that someone could use the threat to justify expenses never disclosed before, in a state of emergency is known that many canonical steps for approval of investments are deliberately skipped to the benefit of nearby businesses to governments.

Why we intend to define the components of Anonymous cyber-terrorists and cyber criminals?

Mr. Richard Stiennon, Chief Research Analyst at IT-HARVEST, draws some distinctions in the definitions as well. A cybercriminal is generally motivated purely by profit. That is a different goal than cyber espionage, which seeks to access intellectual property for military or industrial strategic advantage, or cyberwar, which focuses on actually sabotaging infrastructure, disrupting critical systems, or inflicting physical damage on an enemy.

Do you recognize anonymous in one of these definitions?

The reality is dramatic, many countries like America and european members states are vulnerable to cyber attacks. Tens and thousands of critical structures are still vulnerable and in many cases also not counted. The real problem will be actions of cyber-terrorism, the business of terror is aware of the situation of the infrastructures and it is ready to hit. Consider for example how a terrorist act is mutated, once a group of subversive planned in secret the attack todays is it try to involve young guys to masquerade the real source of the attacks. The cyber recruiting is really simple, it is enough to announce an operation of Anonymous in specific channel (e.g. chat, social networks) to attract young people living in myth of the hacker, unaware of the real targets of a mission. The availability of tools for offense on the internet makes it easy circumvention of our children.
It ‘s time to come out, inform the masses, but in proper manner, absurd that person like my father still ignore terms like cyber terrorism and cyber weapons.
Pierluigi Paganini


facebook linkedin twitter

Anonymous China Critical infrastructures cyber armies Cyber Crime cyber operations cyber terrorism cyber weapons cybercriminal Espionage group of hacktivists hacktivist hacktivists infrastructures Iran North Korea NSA Russia U.S. warfare

you might also like

Pierluigi Paganini July 03, 2025
China-linked group Houken hit French organizations using zero-days
Read more
Pierluigi Paganini July 02, 2025
Cisco removed the backdoor account from its Unified Communications Manager
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    China-linked group Houken hit French organizations using zero-days

    APT / July 03, 2025

    Cybercriminals Target Brazil: 248,725 Exposed in CIEE One Data Breach

    Data Breach / July 03, 2025

    Europol shuts down Archetyp Market, longest-running dark web drug marketplace

    Cyber Crime / July 03, 2025

    Kelly Benefits data breach has impacted 550,000 people, and the situation continues to worsen as the investigation progresses

    Uncategorized / July 03, 2025

    Cisco removed the backdoor account from its Unified Communications Manager

    Security / July 02, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT