• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Severe Hikvision HikCentral product flaws: What You Need to Know

 | 

U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog

 | 

Google addressed two Android flaws actively exploited in targeted attacks

 | 

U.S. CISA adds WhatsApp, and TP-link flaws to its Known Exploited Vulnerabilities catalog

 | 

Android droppers evolved into versatile tools to spread malware

 | 

Jaguar Land Rover shuts down systems after cyberattack, no evidence of customer data theft

 | 

Cloudflare blocked a record 11.5 Tbps DDoS attack

 | 

Palo Alto Networks disclosed a data breach linked to Salesloft Drift incident

 | 

Von der Leyen’s plane hit by suspected Russian GPS Jamming in Bulgaria, landed Safely

 | 

Supply-chain attack hits Zscaler via Salesloft Drift, leaking customer info

 | 

Crooks exploit Meta malvertising to target Android users with Brokewell

 | 

North Korea’s APT37 deploys RokRAT in new phishing campaign against academics

 | 

Fraudster stole over $1.5 million from city of Baltimore

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 60

 | 

Security Affairs newsletter Round 539 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Amazon blocks APT29 campaign targeting Microsoft device code authentication

 | 

Lab Dookhtegan hacking group disrupts communications on dozens of Iranian ships

 | 

New zero-click exploit allegedly used to hack WhatsApp users

 | 

US and Dutch Police dismantle VerifTools fake ID marketplace

 | 

Experts warn of actively exploited FreePBX zero-day

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Hacktivism
  • Hacker Interviews – The AnonRising IRC collective

Hacker Interviews – The AnonRising IRC collective

Pierluigi Paganini September 08, 2016

Today I’ll present you AnonRising IRC, a very active collective of hacktivist that participated in the major hacking campaigns.

AnonRising IRC

Enjoy the interview

You and your AnonRising IRC team are talented hackers that have already participated in several hacking campaigns, could you tell me more about you?

We have participated in many operations list is below including a little bit about each op. OpISIS – The role we played in this was to stem them

  • OpISIS – The role we played in this was to stem them the flow of recruitment sites being set up by isis members to gain support around the world. We did this via DDoS over long periods of time so they were paying for a site that could not be reached.
  • OpWhales, OpKillingBay-EU, OpSeaWorld – For this op we provide network support via creating media and assisting in any way we can help as our planet’s sea life deserves saving.
  • Anonymous OpKillingBay Announcement 2016
  • OpAnonHQ – This operation was setup via AnonRising Squad members @freesecpower @N3mesiss @RisingSquad_ @AnonRisingSec. The aim of this operation was to make people aware of the amount of money AnonHQ.com are making from the “None Profit” collective Anonymous links to some of our media below.
  • OpAnonHQ Awareness video for NewBloods
  • OpNoDapl – As a network AnonRising we provided media mirrors and IRC support for this operation and shared awareness via other social media platforms.
  • OpNoDapl Anonymous Message To Obama

Could you tell me which his your technical background and when you started hacking?

With us providing the AnonRising IRC network there are many users with varied skills thus allowing us to be diverse in the way we gather and exploit our targets. Anonymous has always been about the unity we are not all hackers and coders some are here to assist in language translation, Linux Os support, video editing more listed below.

SQLI, XXS, DDOS, XST, Python, C++, C, Perl, PHP, HTML, CSS, FLASH. As for when we started I would rather answer for the network and say that some of us have been around for a very long time. Others are here that are just learning but we feel it is important to share skills and knowledge both within and outside of the IRC network.

Which are your motivations?

Our greatest challenge at the moment is more an awareness operation in regards to AnonHQ and the profit they are making from the none profit collective some details are below and a video.

AnonHQ is a business not Anonymous:

Traffic & Earnings (Estimated)

  • Purchase/Sale Value: $452,520 USD
  • Daily Revenue: $1,240 USD
  • Monthly Revenue: $37,734 USD
  • Yearly Revenue: $452,510 USD
  • Daily Unique Visitors: 261,001
  • Monthly Unique Visitors: 7,944,048
  • Yearly Unique Visitors: 95,265,365

What was your greatest hacking challenge? Which was your latest hack? Can you describe me it?

Our latest attack via RisingSquad Team was on anonboards.com who also sell and profit from the name Anonymous. Again our goal here is to stem the cash flow to theses fake sites profiting from people who have been drawn in by their deceit to be the Anonymous headquarters and true voice of the collective. This is an ongoing operation. (We have no leaders & We do what we do for the people to get their voices heard. Most of us have daily jobs and families just like everyone else and do this for no financial gain.)

What are the 4 tools that cannot be missed in the hacker’s arsenal and why?

Must have tools ZenMap,SqlMap,Metasploit,Hydra Many more but as you asked for 4.

Which are the most interesting hacking communities on the web today, why?

As for communities we run a network called AnonRising so most of our time is spent here and social media platforms like twitter recommended people to follow would be. @YourAnonGlobal @YourAnonNews @h0t_p0ppy @AnonIntelGroup @AnonymousCenter @4n0nc47

We run a network called AnonRising – ( http://anonrising.xyz  ) so most of our time is spent here.

Did you participate in hacking attacks against the IS propaganda online? When? How? Where do you find IS people to hack? How do you choose your targets?

Targets are brought up and discussed via groups we do not actively look for targets they normally present them selves via the news and world current affairs. As most no Anonymous support the people and try to make them aware of things most media miss represent or cover up just like the Anonymous collective are miss represented at times by the press.

We often hear about cyber weapons and cyber attacks against critical infrastructure. Do you believe it is real the risk of a major and lethal cyber attack against a critical infrastructure? Thanks a lot again, send me a picture to use as your avatar.

In this current world of technology running most critical infrastructure, I am afraid yes this is a reality and could be done unless people start paying attention to network security.

Theses answers are from the twitter accounts below @AnonRisingSec @AnonRisingIRC @freesecpower @BitsOfSkin

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs –  Hacker, AnonRising IRC)


facebook linkedin twitter

AnonRising IRC Cybersecurity Hacking Hacktivism ISIS

you might also like

Pierluigi Paganini September 04, 2025
Severe Hikvision HikCentral product flaws: What You Need to Know
Read more
Pierluigi Paganini September 04, 2025
U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Severe Hikvision HikCentral product flaws: What You Need to Know

    Hacking / September 04, 2025

    U.S. CISA adds TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities catalog

    Hacking / September 04, 2025

    Crooks turn HexStrike AI into a weapon for fresh vulnerabilities

    Cyber Crime / September 03, 2025

    Google addressed two Android flaws actively exploited in targeted attacks

    Security / September 03, 2025

    U.S. CISA adds WhatsApp, and TP-link flaws to its Known Exploited Vulnerabilities catalog

    Hacking / September 03, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT