UCC Operation, Indian Cyber Mafia, Indian Cyber Force, Team 1-4-1 and Kerala Cyber Xtractors, according to Radware. Meanwhile, incidents of hacktivism have only increased in the Middle Eastern and Asian region followed by Europe, following the Russia-Ukraine war.
According to Radware, over 1,800 DDoS attacks were claimed by political and religious hacktivists across 80 Telegram channels between 18 February and 18 April. NoName057(16) claimed almost 30% of the attacks, followed by Anonymous Sudan (18%) and Mysterious Team (13%).
NoName057(16) is by far the most active DDoS hacktivist among the politically driven, pro-Russian hacktivists. Anonymous Sudan, Mysterious Team, and Team Insane PK are responsible for most of the religiously-motivated DDoS activity and ranked second, third, and fourth respectively among hacktivists claiming the most attacks, notes Radware.
Passion, the pro-Russian, turned for-profit criminal hacktivist group that provides DDoS-for-hire services, targets large US-based tech companies. According to Panda Security, hacktivists use many techniques including Doxing, which exposes personal and identifiable information about a specific person or group to the public; Anonymous blogging; DoS and DDoS attacks; Informational leaks that use insider sources to publicise incriminating information; Geo-bombing that exposes hidden locations of an image; Website mirroring that replicates a real website with a slightly different URL (internet address) to evade censorship laws; and Code Changing of a website to personalize website content and deface the site’s appearance to fit the message of their own agendas.
Read more on livemint.com