Hacktivists turn up the heat, could you be the next target?
Per Wikipedia, Hacktivists are computer hackers whose activity is aimed at promoting a social or political cause. The politics and causes are of course wide ranging!
Hacktivism is growing across all targets, data suggest. For example, the Multi-State Information Sharing and Analysis Center says that hacktivist incidents involving state and local governments more than doubled in 2016 compared to 2015. Hacktivism will continue to grow in 2017, according to Tom Kellermann, CEO of Strategic Cyber Ventures, in an interview with Tech News World. He said that political disillusionment is making Americans more inclined towards hacktivism.
Although participating in these attacks is illegal, the line can seem vague in the cyber world—so it’s easy for activists to ignore it. Activists who refrain from taking violent physical action against a company may willingly participate in mass cyber actions because they don’t expect to be singled out. There is also less awareness of the laws governing cyber attacks, further limiting inhibitors to destructive protests delivered online.
The most common targets of cyber protests or hacktivists are organizations that have traditionally faced physical protests, typically for some perceived unfair treatment—of the environment, workers, animals—or those with political stances that others find objectionable. But whereas activists in the past needed a critical mass of opposition to pose a real threat or cause a public relations stir, a handful of today’s cyber protesters can cause. A few individuals can send a loud message by defacing a company’s Web site, for example. Social networking exacerbates the risk and can be exploited to quickly multiply force levels of hacktivists. Some companies have been surprised they’ve been hit by hacktivists—assuming they were not large enough or did not possess a sufficiently high profile to be targeted, according to experts at Damballa, a network security firm.
Hacktivists Beware, they are coming for you!
In an interesting twist, a recent report by Bleeping Computer shows that people signing up for the annual #OpIsrael effort, which happens every year on the 7th of April, had been tricked into downloading DDoS tools that contained hidden malware.
For instance, an Android APK that would allow Anonabees to join in with DDoSing Israeli targets included a remote access trojan that gave access to the user’s camera, mic, browser, call logs and location. So even Hacktivists can turn into targets for other Hacktivists. Is no one safe?
More Here [bleepingcomputer]
This article has been recently updated due to erroneous information.