Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Cyber Warfare

How The Anonymous Hacker Group Wages Cyber Warfare

admin by admin
Dec 22, 2022
in Cyber Warfare
0 0
A A
0
FacebookTwitterLinkedIn

While some people choose to protest through marches or sit-ins, a select group of computer hackers use their talents to wage cyberattacks as part of the collective known as Anonymous.

The origins of this group are murky, but they’ve made a name for themselves over the years by targeting high-profile institutions, including the Church of Scientology, the CIA and the Russian government, as a form of hacktivism.

Their usual form of online warfare is a distributed denial of service attack, known as DDoS, when a server is overwhelmed by an increase in traffic, according to Cloudflare. Unable to accommodate the influx of users, the server often becomes slow or crashes, resulting in a denial of service.

In addition to the attacks, members of the group will release videos in which they alter their voice and wear masks resembling Guy Fawkes — a historic figure who participated in the failed assassination of King James I, though the mask is more closely associated with the “V For Vendetta” film.

RELATED: Peacock’s New Docuseries ‘Paul T. Goldman’ Blends Comedy With True Crime In Trailer

But these methods aren’t just used against powerful institutions. In 2014, the group initiated a DDoS attack against the Boston Children’s Hospital, whose doctors had been involved in removing a young girl, Justina Pelletier — the subject of the Peacock docuseries “The Battle For Justina Pelletier” — from her parent’s custody following concerns that she was being medically abused.

It was an atypical move for the organization, seeing as it’s a hospital, but there’s no centralized leadership within Anonymous. Rather, members of the group issue public calls for support in waging an attack.

Anonymous Mask

Photo: Getty Images

In the case of Boston Children’s Hospital, a hacker released a YouTube video and a letter in which they outlined their grievances with the situation concerning Justina Pelletier. In the letter, the hacker stated, “To the Boston Children’s Hospital why do you employ people that clearly do not put patient’s first?” according to Slate.

Following the public statement, the hospital was impacted by a DDoS attack, forcing their system offline, per Slate’s report.

And though Anonymous has no formal leadership structure, a separate Anonymous Twitter profile tweeted, “To all the Anons attacking the CHILDREN’s Hospital in the name of Anonymous – IT IS A HOSPITAL: STOP IT,” according to the documentary. Shortly thereafter, the attack ceased.

The attack lasted at least a week and caused at least $300,000 in damage, according to “The Battle For Justina Pelletier.”

A police handout of Robert Hoagland

A police handout of Robert Hoagland

The Pelletier family was unaware of the group prior to the attack, with Justina’s father, Lou Pelletier, saying in the documentary, “We never knew how many people were involved, who was doing it. We just knew that what they were doing was helping to make sure Justina’s plight was going to be heard.”

In 2016, hacker Martin Gottesfeld was convicted of one count of conspiracy to damage protected computers and one count of damaging protected computers in relation to the attack, according to the Justice Department. He was sentenced to at least 10 years, the Associated Press reported.

Gottesfeld and his wife, Dana Gottesfeld, had attempted to escape capture but were taken into custody in 2014 after they issued a distress call from a small boat en route to the Bahamas from Cuba, where they were denied political asylum. They had to be rescued by a Disney cruise ship, according to the AP.

Oxy App

Oxy App

While they were caught, Marty said he has no regrets over his actions. Speaking on the phone from Terra Haute Corrections, Marty said in “The Battle For Justina Pelletier,” “I would do it all again in a heartbeat. In fact, I would do it even sooner.”

Anonymous briefly went dark in 2018, before resurfacing at the height of the Black Lives Matter movement in 2020. Most recently, they’ve participated in attacks against the Russian Ministry of Defense in protest of the war in Ukraine, according to the Guardian.

To learn more about Gottesfeld’s attack on Boston Children’s Hospital, watch “The Battle For Justina Pelletier,” streaming Dec. 13 on Peacock.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Lawmakers outline cyber priorities for Pentagon
Cyber Warfare

Lawmakers outline cyber priorities for Pentagon

In troubled times, Biden’s State of the Union address should embrace peace through strength
Cyber Warfare

In troubled times, Biden’s State of the Union address should embrace peace through strength

Beacon Global Strategies Adds Two National Security Experts to Its Growing Team and Announces Several Promotions
Cyber Warfare

Beacon Global Strategies Adds Two National Security Experts to Its Growing Team and Announces Several Promotions

A Digital Red Cross: What Would It Defend Against?
Cyber Warfare

A Digital Red Cross: What Would It Defend Against?

FTSE 350 Review: Ukraine drives the strategic imperative for aerospace & defence
Cyber Warfare

FTSE 350 Review: Ukraine drives the strategic imperative for aerospace & defence

Ransomware attack halts London trading
Cyber Warfare

Ransomware attack halts London trading

Beacon Global Strategies Adds Two National Security Experts to Its Growing Team and Announces Several Promotions
Cyber Warfare

Beacon Global Strategies Adds Two National Security Experts to Its Growing Team and Announces Several Promotions

Russia’s cyber warfare in Ukraine tops 2022 incidents list: Tokio Marine
Cyber Warfare

Russia’s cyber warfare in Ukraine tops 2022 incidents list: Tokio Marine

Cyber Warfare

FAA outage: White House says ‘no evidence of cyber attack,’ Biden briefed on grounded flights

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Hackers Actively Using Pupy RAT to Attack Linux Systems

Hackers Actively Using Pupy RAT to Attack Linux Systems

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Hackers Actively Using Pupy RAT to Attack Linux Systems
  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.