• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Orange reports major cyberattack, warns of service disruptions

 | 

Hackers leak images and comments from women dating safety app Tea

 | 

Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

 | 

Seychelles Commercial Bank Reported Cybersecurity Incident

 | 

Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

 | 

U.S. CISA adds Cisco ISE and PaperCut NG/MF flaws to its Known Exploited Vulnerabilities catalog

 | 

Critical WordPress Post SMTP plugin flaw exposes 200K+ sites to full takeover

 | 

Scattered Spider targets VMware ESXi in using social engineering

 | 

China-linked group Fire Ant exploits VMware and F5 flaws since early 2025

 | 

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Cyber Crime
  • Hacking
  • Security
  • Anonymous Reloaded. Yesterday, today, tomorrow

Anonymous Reloaded. Yesterday, today, tomorrow

Pierluigi Paganini May 04, 2012

The word “Anonymous ” evokes the myth of the hacker in today’s society that defends freedom of expression and agrees with sensational cyber operations in the fight against censorship and government and industrial questionable policies.
If Anonymous is perceived by future generations as an attractive ideology to follow, industry and government view with concern the threat posed by the group’s operations. The recent security reports, such as that produced by Verizon, indicates the phenomenon of hacktivism as the main threat of cybercrime planet, estimating the damage done by groups like Anonymous in their frequent operations.

The majority of IT and security professionals is convinced that Anonymous and groups of hacktivists are main cyber threats able to attack their organizations impacting on their primary business. Around the 64% of the nearly 2,000 IT professionals who participated in Bit9’s 2012 Cyber Security Survey believe that their companies will be target of a cyber attack during the next six months and 61% of them chose hacktivists as the likely attackers.

Of course the main factor exposes companies to the threat of the group is their media exposure, the participation to the policies or international public debates on new regulations. The group has demonstrated, in my opinion a great consistency in his choice of targets, offending companies that have distinguished themselves in approaching the topics so controversial that the group is interested.  No one can be considered safe, from the provider who is willing to support the new regulations such as the Cyber ​​Intelligence Sharing and Protection Act (CISPA) to the government agency intents on pursuing questionable international policies.

But which is the method of attack that most scares the companies?

Despite the companies afraid Anonymous and hacktivism they are most worried by the usage of malware as cyber weapon instead of the classic Distributed denial-of-service (DDoS) and SQL injection attacks preferred by the notorious hackers.

On this data we can make a couple of interesting reflections:

Companies are scared of hacktivism but consider its mode of attacks not so dangerous. The fear on anonymous attacks is related to the media effect of its operations that could damage the image of the business and also to attract other criminals groups on the target.

Second point, it is expected a radical change in the modus operandi of the Anonymous group because it is attracting also many hackers and professional that are interested to its operations. The skill of the hackers is increasing and the imminent risk is that a 0-day vulnerabilities could be found and exploited by the hacktivist causing extensive damage. The scenario described is not so absurd, let’s consider in fact that many operations of the groups could be shared and approved directly by government groups of hacker under coverage. In this case the power of attack of the group could be amplified. Let’s consider also that there is the high risk of infiltrations of the groups, Anonymous could be compared to a powerful cyber weapon. In that case operations could be addressed against political targets.

Many experts are sure that behind the recent attacks to China and it’s Great Firewall there is also the support of western intelligence, same scenario in Syria and in Tibet where groups of hacktivist have provided technological support to the dissidents.

Anonymous, and foreign governments, are well informed on the impact that political scandals could have on a country like China, emblematic is the case of communist party politician Bo Xilai.

Xilai, the former Chongqing party chief, was removed from it engagements in his party positions last week because with his wife, Gu Kailai, are being investigated over the murder of British businessman Neil Heywood. The news has a dramatic effect on Chinese Public opinion, for this reason immediately the government has increased the monitoring of the social media to contain the diffusion of the news. On the other side, groups related to Anonymous have started to attacks principal government web sites trying to force the censorship wall. Just for information searches for both Bo Xilai and his wife’s name were quickly blocked on Sina Weibo, and mass censorship of comments began.

What we expect from Anonymous in the future?

Nobody in technology, nor in business, could ignore the cyber threat moved by the group and must consider it in its cyber strategy. In the same time the group have to increase its  operations and their media effects choosing more striking objectives and conducing attacks able to make more and more damage. Next steps will include most advanced attack methods such as creating malware that to exploit unknown vulnerabilities.

Anonymous must be analyzed with a multidisciplinary approach, it is an amorphous creature that quickly changes and is able to adapt its behavior to the context he need to attack thanks the large and heterogeneous participation in its collective. But do not forget that “Anonymous” due its notoriety has become the perfect scape goat, government and private industry can perform cyber attacks in the name of the groups involving critical masses.

We run the serious risk of being frightened by the entity directing our efforts against the wrong image reflected in a mirror, the result of diversions or worse of an undercover action. In my opinion this is the most disturbing aspect of the story.  How to avoid this? It’s hard to say, it is impossible to hazard a forecast. Personally, if I were part of the collective, I would begin to evaluate a social opening considering that the movement is also expression of large masses.

That is the real challenge for a movement that may die due its notoriety, but consider that the outing isn’t so simple because Anonymous has no unified voice and hasn’t a real control center.
The choice could actually split the group, giving rise to crazy cells, impossible to control and very dangerous.

Pierluigi Paganini


facebook linkedin twitter

Anonymous China Cyber attacks cyber weapon Cybercrime DDoS great firewall Hackers Hacktivism hacktivist Syria Verizon

you might also like

Pierluigi Paganini July 29, 2025
Orange reports major cyberattack, warns of service disruptions
Read more
Pierluigi Paganini July 29, 2025
Hackers leak images and comments from women dating safety app Tea
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Orange reports major cyberattack, warns of service disruptions

    Security / July 29, 2025

    Hackers leak images and comments from women dating safety app Tea

    Data Breach / July 29, 2025

    Pro-Ukraine hacktivists claim cyberattack on Russian Airline Aeroflot that caused the cancellation of +100 flights

    Hacktivism / July 29, 2025

    Seychelles Commercial Bank Reported Cybersecurity Incident

    Data Breach / July 29, 2025

    Microsoft uncovers macOS flaw allowing bypass TCC protections and exposing sensitive data

    Hacking / July 29, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT