Cyber Affairs
No Result
View All Result
  • Login
  • Register
  • Home
  • Live Threat Map
  • Books
  • Careers
  • Latest
  • Podcast
  • Popular
  • Press Release
  • Reports
  • Tech Indexes
  • White Papers
  • Contact
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
COMMUNITY
NEWSLETTER
  • AI
  • Cyber Crime
  • Intelligence
  • Laws & Regulations
  • Cyber Warfare
  • Hacktivism
  • More
    • Digital Influence Mercenaries
    • Digital Diplomacy
    • Electronic Warfare
    • Emerging Technologies
    • ICS-SCADA
    • Books
    • Careers
    • Cyber Crime
    • Cyber Intelligence
    • Cyber Laws & Regulations
    • Cyber Warfare
    • Digital Diplomacy
    • Digital Influence Mercenaries
    • Electronic Warfare
    • Emerging Technologies
    • Hacktivism
    • ICS-SCADA
    • News
    • Podcast
    • Reports
    • Tech Indexes
    • White Papers
NEWSLETTER
No Result
View All Result
Cyber Affairs
No Result
View All Result
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers
Home Hacktivism

Meet the Environmental Hacktivists Trying to ‘Sabotage’ Mining Companies

admin by admin
Dec 22, 2022
in Hacktivism
0 0
A A
0
FacebookTwitterLinkedIn

Hacking. Disinformation. Surveillance. CYBER is Motherboard’s podcast and reporting on the dark underbelly of the internet.

A hacktivist group claims to have hacked several mining and oil companies, as well as government agencies in Central and South America in an attempt to “sabotage” western companies and corporations that exploit the region’s natural resources.  

The group, which calls itself Guacamaya, the Mayan name for a macaw parrot, claims to have hacked a Colombian government agency that administers and regulates hydrocarbon materials, the Guatemalan Ministry of Environment and Natural Resources, the Colombian oil company New Granada Energy Corporation, the Brazilian mining company Tejucana, the Venezuelan oil company Oryx Resources, the Ecuadorian state-owned mining company ENAMI EP, Quiborax, the third largest boric acid producer in the world based in Chile.  

None of these companies and government agencies responded to a request for comment. 

The group published thousands of emails from the hacking victims through the group Distributed Denial of Secrets and Enlace Hacktivista, a site that has the goal of documenting hacker history and publishing “educational resources for hackers.” 

“You can bring down big things with the snap of your fingers.”

“It is a matter of exposing the companies and government entities, so that everyone knows their way of operating, their actions, their profits and the interest that is clearly to profit no matter the damage they cause to the territory, to the sources of support for communities and peoples. Their trick is to ally with other private and public corporations to impose laws in their favor,” the hackers told Motherboard in an email. “These hacks are another form of struggle and resistance, they are the continuation of an ancestral legacy; taking care of life. We hope to cause more people to join, to leak, sabotage, and hack these sources of oppression and injustice, so that the truth be known and that it is the people who decide to end it.” 

The hackers also said that they scanned the internet looking for anything interesting and important to hack and leak among targets that were “easily vulnerable.” 

“We spent little time, we downloaded their emails and that was it,” the hackers told Motherboard, while remarking that their previous hack against Pronico, a mining company in Guatemala, took them more than six months.

Screen Shot 2022-08-15 at 11.11.59 AM.png

A screenshot of the video the hacktivists published.

The hacktivist group published a manifesto in Spanish in which they decry how countries such as the United States, and western corporations, have taken advantage of the natural resources of Central America, which the group refers to as Abya Yala, the original indigenous name of the region between northern Colombia and Panama. 

“Five centuries (529 years) of genocide, terricide, pillage, and violations of our territory of Abya Yala, five centuries or fighting and resistance. We have been alive for 500 years, defending life with life itself. We have spirit and love, we dream of going back to clear days and following paths with harmony and balance with our mother: earth,” the hackers wrote in their manifesto. “Enough with so much impunity! We all are Guacamaya. From the north to the south of our land of vital blood. We are in schools, universities, in houses, in the mountains, and in the jungles.”

It’s unclear if the breaches had any other effect than the theft and leak of internal emails. 

The hackers also published a video that shows how they hacked Pronico, which the hackers broke into earlier this year. Publishing a video and a manifesto shows that the hackers are clearly inspired by the notorious hacking vigilante Phineas Fisher, who hacked the spyware vendors FinFisher and Hacking Team years ago, and then published detailed guides on how they did it. 

“ Just leak and sabotage with joyous rebellion!”

The hackers told Motherboard that the famous hacktivist was “a source of inspiration.” In fact, when Motherboard asked for an interview, the hackers initially asked to do it on camera through a puppet of a macaw parrot, a request inspired by an interview with Phineas Fisher for the VICE documentary series CYBERWAR, which was conducted with a puppet representing the hacker.

Phineas Fisher told Motherboard that Guacamaya are continuing the “Hack Back” style, but that “they seem more inspired by indigenous resistance than by any hacks.”

“The video was great, they seem like a serious APT (Artistic Persistent Threat),” Phineas Fisher joked, with a play on the cybersecurity term Advanced Persistent Threat. 

Just like Phineas Fisher did in the manifesto the hacker wrote a few years ago, Guacamaya challenged people to take on the fight themselves, and hack away.

“As you can see in the video, hacking is not magic nor does it require a lot of tools nor advanced technical knowledge. It was all made with free open source tools, which anyone can learn to use. Just leak and sabotage with joyous rebellion!” the hackers proclaimed. 

“Learning to hack is figuring out that ‘power’ is subjective,” the hackers told Motherboard, “that you can bring down big things with the snap of your fingers.” 

Subscribe to our podcast, CYBER. Subscribe to our new Twitch channel.

Read the full article here

ShareTweetSharePinShareShareSend

Related Articles

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.
Hacktivism

Blocking blasphemy and defamatory content. Cyberattacks as influence ops. Industry perspectives on Chat GPT.

Healthcare industry most common victim of third-party breaches, Black Kite finds
Hacktivism

Healthcare industry most common victim of third-party breaches, Black Kite finds

Why cybercrooks love Telegram Messenger
Hacktivism

Why cybercrooks love Telegram Messenger

Preparing for an attack on the war’s anniversary.
Hacktivism

Preparing for an attack on the war’s anniversary.

Hacktivism Is a Risky Career Path
Hacktivism

Hacktivism Is a Risky Career Path

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams
Hacktivism

Hashtag Trending Jan 24th-Hacktivist browses national security secrets, laid-off engineer claims big tech sees staff as disposable, Stanford university students use ChatGPT for final exams

Pro-Russia Hacktivist Group’s Support and Influence Grows
Hacktivism

Pro-Russia Hacktivist Group’s Support and Influence Grows

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks
Hacktivism

Hacktivist anger over war in Ukraine fuels spike in DDoS attacks

The global ICS security market is projected to grow from USD 16.7 Billion in 2022 to USD 23.7 Billion by 2027, at a Compound Annual Growth Rate (CAGR) of 7.2% from 2022 to 2027
Hacktivism

The DDOS protection and mitigation security market is projected to grow from USD 3.9 billion in 2022 to USD 7.3 billion by 2027, at a CAGR of 132%

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended Stories

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Buckle Up_ BEC and VEC Attacks Target Automotive Industry

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Chinese Chipmaker Nexperia: Gigabytes of Data Stolen

Popular VPN Software Flaw Let Attackers Crash the Systems

Popular VPN Software Flaw Let Attackers Crash the Systems

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

Hackers Customize LockBit 3.0 Ransomware To Attack Orgs Worldwide

What Security Leaders Need to Know

What Security Leaders Need to Know

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Popular Stories

  • Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    Fortinet Vulnerability Exploited To Deploy RMM Tools & Backdoor

    0 shares
    Share 0 Tweet 0
  • Malware Trends 2024 – Top Malware Families and Types

    0 shares
    Share 0 Tweet 0
  • French Football Club Ticketing System Targeted in Cyber Attack

    0 shares
    Share 0 Tweet 0
  • Singha Durbar server continues to face cyberattacks

    0 shares
    Share 0 Tweet 0
  • Argentina – Global Investigations Review

    0 shares
    Share 0 Tweet 0
Cyber Affairs

Cyber Affairs is your one-stop news website for the latest cyber crime, cyber warfare, and all cyber related news and updates, follow us to get the news that matters to you.

LEARN MORE »

Recent News

  • Buckle Up_ BEC and VEC Attacks Target Automotive Industry
  • Chinese Chipmaker Nexperia: Gigabytes of Data Stolen
  • Popular VPN Software Flaw Let Attackers Crash the Systems

Topics

  • AI
  • Books
  • Careers
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • News
  • Podcast
  • Reports
  • Tech Indexes
  • Uncategorized
  • White Papers

Get Informed

The most important cyber news and events of the day

Be the first to know latest important news & events directly to your inbox.

By signing up, I agree to our TOS and Privacy Policy.

Copyright © 2022 Cyber Affairs. All rights reserved.

No Result
View All Result
  • Home
  • Cyber Crime
  • Cyber Intelligence
  • Cyber Laws & Regulations
  • Cyber Warfare
  • Digital Diplomacy
  • Digital Influence Mercenaries
  • Electronic Warfare
  • Emerging Technologies
  • Hacktivism
  • ICS-SCADA
  • Reports
  • White Papers

Copyright © 2022 Cyber Affairs. All rights reserved.

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.