Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Hacktivism

Environmental hacktivists publish 2 terabytes of mining company emails

admin by admin
Dec 22, 2022
in Hacktivism
0 0
A A
0
FacebookTwitterLinkedIn
Written by AJ Vicens

Aug 3, 2022 | CYBERSCOOP

A hacktivist collective posted more than 2 terabytes of hacked emails and files from a host of mining companies in Central and South America on Wednesday, in a move to apparently expose environmental damage in the region.

The group — which calls itself Guacamaya, named for a type of bird — posted the files from five public and private mining companies and two public agencies responsible for environmental oversight, one in Colombia and the other in Guatemala. The material was posted to a website called Enlace Hacktivista, a site for documenting hacker history, sharing educational resources, and that provides space “for hackers to publish their hacks, leaks, and communiques.”

In a Spanish-language statement posted with the materials, the group decried what it described as environmental devastation at the hands of U.S. and other international governments and firms that plunder the region’s resources.

“All we really want, as our own mother warns us, is for this to stop,” the statement read, according to a Google translation. “We want them to stop, to stop once and for all exploiting, mining, polluting, that desire for dominance.”

The materials come from ENAMI, an Ecuadorian state mining company; the Agencia Nacional de Hidrocarburos (ANH) in Colombia; New Granada Energy Corporation in Colombia; Quiborax, a mining company in Chile; Oryx, an oil company in Venezuela; Tejucana, a Brazilian mining company; and Guatemala’s Ministerio De Ambiente y Recursos Naturales.

DDoSecrets, a transparency advocacy website that also hosts hacked materials in the public interest, published a release on the files simultaneously Wednesday.

Guacamaya, in March, released 4.2 terabytes of hacked material from mining subsidiaries of a Swiss investment group that detailed the companies’ apparent pollution in Guatemala. The files became part of a massive reporting project involving 65 journalists around the world that exposed not only proof of pollution, but efforts to manipulate local governments and surveillance of journalists.

After that hack, the group posted a video detailing how they accessed the systems and stole the files and emails. They also gave an interview talking about why they’re going after these companies to Forbidden Stories, the organization that coordinated and published a series of stories based on the documents.

“The role of a hacker is to take part in the different forms of resistance in any territory where there is dignified rage and a joyful desire for radical revolution,” they said.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.
Hacktivism

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.

Healthcare industry most common victim of third-party breaches, Black Kite finds
Hacktivism

Healthcare industry most common victim of third-party breaches, Black Kite finds

Why cybercrooks love Telegram Messenger
Hacktivism

Why cybercrooks love Telegram Messenger

Preparing for an attack on the war’s anniversary.
Hacktivism

Preparing for an attack on the war’s anniversary.

Hacktivism Is a Risky Career Path
Hacktivism

Hacktivism Is a Risky Career Path

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams
Hacktivism

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams

Pro-Russia Hacktivist Group’s Support and Influence Grows
Hacktivism

Pro-Russia Hacktivist Group’s Support and Influence Grows

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks
Hacktivism

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks

The global ICS security market is projected to grow from USD 16.7 Billion in 2022 to USD 23.7 Billion by 2027, at a Compound Annual Growth Rate (CAGR) of 7.2% from 2022 to 2027
Hacktivism

The DDOS protection and mitigation security market is projected to grow from USD 3.9 billion in 2022 to USD 7.3 billion by 2027, at a CAGR of 132%

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.