{"id":74243,"date":"2012-05-25T08:26:49","date_gmt":"2012-05-25T08:26:49","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=74243"},"modified":"2012-05-25T08:26:49","modified_gmt":"2012-05-25T08:26:49","slug":"future-watch-the-impending-dangers-of-hacktivism-and-political-hacking-2","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/future-watch-the-impending-dangers-of-hacktivism-and-political-hacking-2\/","title":{"rendered":"Future Watch I: The impending dangers of Hacktivism and political hacking"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2012\/05\/anonymous-logo.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2012\/05\/anonymous-logo.jpg\" alt=\"Anonymous logo\" title=\"Anonymous logo\" width=\"320\" height=\"245\" class=\"alignleft size-full wp-image-74256\" \/><\/a>Hacktivism is a rising threat to cyber security that we are sure to see more of in the coming years. Out of the 174 million reported cyber crimes in 2011, around 100 million of them are related to hacktivism. This term refers to the hacking of networks or websites by a group for a political or social cause. &#8216;Anonymous&#8217; is the most widely recognized hacktivist organization and their targets have been picked due to reasons like human rights abuse, privacy concerns, social messages and other related issues.<\/p>\n<p>The threat scenario once a target is picked translates either to a security breach or a DDoS (Distributed Denial of Service) attack. Apart from this, data theft is also a serious concern. When enterprises or Governments are targeted, the financial loss or data loss risk is insurmountable. Website defacement is one of the most common attack vectors. It usually occurs in the shape of a condemning or accusatory message on the homepage of the breached website.<\/p>\n<p>Some hacktivist threats are carried out by Governments for privacy and censorship measures. This leads to file content viewing, keylogger program installation, screenshot captures, information sent to remote IP addresses and email\/social media account hacking. Private lives of prominent people and public figures are also under public scrutinization.<\/p>\n<p>In the coming years, the convergence of hacktivism and social media seems imminent. The reach of networks like Facebook, Twitter etc. could lead to large scale coordinated attacks and in some instances, physical demonstrations. Hacktivists have already shown their prowess in the case of the Syrian President (targeted by Anonymous). The case of Egyptian protests utilizing social media also demonstrated the power that hacktivists possess.<\/p>\n<p><center><strong>Notable hacktivist incidents:<\/strong><\/center>&nbsp;<\/p>\n<table width=\"100%\" border=\"1\" cellspacing=\"0\" cellpadding=\"4\">\n<colgroup>\n<col width=\"64*\" \/>\n<col width=\"64*\" \/>\n<col width=\"64*\" \/>\n<col width=\"64*\" \/> <\/colgroup>\n<tbody>\n<tr valign=\"TOP\">\n<td width=\"25%\">\n<p align=\"CENTER\"><span style=\"font-family: 'Times New Roman', serif;\"><strong>DATE<\/strong><\/span><\/p>\n<\/td>\n<td width=\"25%\">\n<p align=\"CENTER\"><span style=\"font-family: 'Times New Roman', serif;\"><strong>VICTIM<\/strong><\/span><\/p>\n<\/td>\n<td width=\"25%\">\n<p align=\"CENTER\"><span style=\"font-family: 'Times New Roman', serif;\"><strong>SOURCE<\/strong><\/span><\/p>\n<\/td>\n<td width=\"25%\">\n<p align=\"CENTER\"><span style=\"font-family: 'Times New Roman', serif;\"><strong>REASON<\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">December 2010<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">MasterCard and Visa websites<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Shutting down of payments to WikiLeaks<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">January 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Tunisian Govt and Egyptian Govt<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">In support of anti-censorship and the opposition respectively<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">April 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Sony PlayStation Network<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Unknown<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Unknown<\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">July 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Monsanto (a biotech firm)<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Protest against oil companies<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">July 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">NATO<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Unknown<\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">July 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">News Corp<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Lulzsec<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">For the phone hacking scandal<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">July 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Apple<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Antisec<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Exploited security flaw in software<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">August 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">RIM<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Team Poison<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Protest against RIM helping police track BlackBerry&#8217;s used in London riots<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">August 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Govt of Syria<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Calling for downfall of the President<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">October 2011<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">40 child pornography sites<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Operation Darknet<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">January 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Dept of Justice, FBI, MPAA and Universal Music<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">In support of SOPA\/PIPA and opposing the shutdown of &#8216;megaupload&#8217;<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">CIA<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Unknown<\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">United Nations<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Casi <\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Hackers posted vulnerabilities<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Foxconn<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Swagg Security<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Protest against abuse of human labor rights<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Syrian President<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">His emails were revealed to the world<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Symantec<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Unknown<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Tried to extort $50,000<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">February 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Texas police, Boston police and Salt Lake City police<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">Reasons related to child porn, anti-graffiti bills and Occupy Boston<\/span><\/span><\/td>\n<\/tr>\n<tr valign=\"TOP\">\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">May 2012<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Indian Congress and Supreme Court website<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\">Anonymous<\/span><\/td>\n<td width=\"25%\"><span style=\"font-family: 'Times New Roman', serif;\"><span style=\"font-size: small;\">In support of Pirate Bay and free speech on the web<\/span><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<br \/>\nWhile hacktivists have been targeting enemies of privacy and free speech so far, the fact remains that these organizations are acting like masked vigilantes. At times they have no clearly stated goals so conflict of interest becomes inevitable. These techniques could be used for extortion and harassment. For instance, Anonymous is a faceless group and the identities of its members are unknown so there is no telling what their motives are.<\/p>\n<p>Hence, it becomes important to distinguish between different kinds of hackers. White-hat hackers breach networks for altruistic reasons while grey-hat hackers have questionable ethics and can use their skills for non-altruistic purposes. Black-hat hackers are the worst of the kind since they utilize their hacking skills for criminal purposes only.<\/p>\n<p>With all kinds of different threats looming around, one needs multi-layered protection that will help protect not only from malware and viruses but also from such new generation threats. Both <a href=\"https:\/\/www.quickheal.com\/small-desktop-edition-win.asp\">Quick Heal Internet Security<\/a> and <a href=\"https:\/\/www.quickheal.com\/qh-total-security.asp\">Quick Heal Total Security<\/a> are products that provide the right mix of multi-layered protection.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hacktivism is a rising threat to cyber security that we are sure to see more of in the coming years. Out of the 174 million reported cyber crimes in 2011, around 100 million of them are related to hacktivism. This term refers to the hacking of networks or websites by a group for a political [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[128,129],"tags":[126,127,58,130,47],"class_list":["post-74243","post","type-post","status-publish","format-standard","hentry","category-future-watch","category-hacktivism","tag-anonymous","tag-ddos","tag-hacking","tag-hacktivism","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/74243"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=74243"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/74243\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=74243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=74243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=74243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}