Nickname | "Gay Furry Hackers" |
---|---|
Formation | April 2022 |
Dissolved | July 2024 |
Type | Cybercrime gang |
Purpose | Hacktivism |
Region | International |
Methods | Hacking |
Membership | "vio", "Kry", "Kittyhawk" |
Official language | English |
Leader | "vio" |
SiegedSec, short for Sieged Security and commonly self-described as the "Gay Furry Hackers", [1] [2] was a black-hat Cyberterrorist [3] group, [4] [5] [2] that was formed in early 2022, that committed a number of high profile cyber attacks, including attacks on NATO, [4] [5] [6] Idaho National Laboratory, [1] [2] and Real America's Voice. [7] [8] On July 10, 2024, after attacking The Heritage Foundation, the group announced that they would be disbanding in an effort to avoid closer scrutiny. [9]
SiegedSec was led by an individual under the alias "vio". [10] Short for "Sieged Security", [11] [12] [13] SiegedSec's Telegram channel was first created in April 2022, [14] and they commonly referred to themselves as "gay furry hackers". [15] [16] SiegedSec has targeted a wide variety of organisations, ranging from intergovernmental organisations like NATO [4] [5] and federal research facilities like the Idaho National Laboratory [1] [2] to right-wing movements like The Heritage Foundation [17] [18] and Real America's Voice, [19] and various U.S. states that have pursued legislative decisions against gender-affirming care. [20]
On February 14, 2023, major Australian software provider Atlassian had its data leaked on the internet by SiegedSec using stolen employee credentials. 13,000 employee records were affected in this hack, and SiegedSec was also able to obtain floorplans for Atlassian offices. [21]
In June 2023, SiegedSec targeted several United States government entities to protest anti–gender-affirming-care bills. The hackers released a variety of data including data from the Government of Fort Worth Texas, The Nebraska Supreme Court, and South Carolina police files. [20]
In April and May 2024, SiegedSec began their second trans rights operation, #OpTransRights2. The hackers successfully targeted and leaked data from Real America's Voice [7] [8] and River Valley Church. [22]
In July 2023, SiegedSec sent a series of spoof emails to undergraduate University of Connecticut students using LISTSERV, falsely announcing the "Unfortunate Passing of Radenka Maric". During an interview with the Hartford Courant , "vio" claimed responsibility for the incident, explained the vulnerability which allowed for them to perform the hack, and said that they "did it for the lulz". [10]
In 2023, NATO portals were compromised twice by SiegedSec. The leak totalled over 3000 internal documents. [23] [4] [5] [6] The portals compromised were Joint Advanced Distributed Learning, NATO Lessons Learned Portal, Logistics Network Portal, Communities of Interest Cooperation Portal, NATO Investment Division Portal, and NATO Standardization Office. [24] Shortly after the incident, NATO announced that they would be investigating the attack. [25] [26]
On October 30, 2023, SiegedSec attacked Bezeq, one of the largest Israeli telecommunication providers. The hackers released information on nearly 50,000 customers. [27]
In November 2023, Idaho National Laboratory's Oracle HR system was compromised leading to the leaking of personal employee data, [28] with the group demanding that the laboratory put research into "creating real-life catgirls" in exchange for the data to be removed. [12] On February 7, 2024, a number of employees received ransom payment requests in the mail with their data. [29]
In July 2024, SiegedSec announced that they had breached and leaked data from conservative think tank The Heritage Foundation, which has led the Project 2025 proposals. They released a statement on Telegram, calling the proposals "an authoritarian Christian nationalist plan to reform the United States government." [16] A Heritage spokesperson dismissed the attacks as "a false narrative and an exaggeration", stating that all databases, systems and websites remained secure. [30] [31] The hacking group released chatlogs of a conversation on Signal between "vio" and Heritage Foundation executive Mike Howell, in which Howell stated that he, in collaboration with the FBI, was "in the process of identifying and outting [ sic ] members of your group."
in mid 2024 a paper released by the United Nations Office of Counter-Terrorism referenced Siegedsec along with GhostSec and Anonymous Sudan [3]
On November 8th 2023, SiegedSec collaborated with Anonymous Sudan with a claimed breach of Israeli telecommunications company Cellcom in an operation against Israel during the Gaza–Israel conflict. [32]
On November 14th 2023, SiegedSec and Anonymous Sudan posted a claimed attack of critical infrastructure (Including BACnet and Global navigation satellite system devices) within Israel, in the same operation against Israel. [33]
In August 2023, an alliance of hacking groups was founded, consisting of SiegedSec, Ghost Security, BlackForums, ThreatSec, and Stormous Ransomware. [34] This alliance went on to claim multiple breaches until eventual inactivity.[ citation needed ]
In December 2023, SiegedSec announced a partnership with hacktivist group ByteMeCrew, claiming a breach against Stalkerware app TheTruthSpy. The two groups worked with Maia arson crimew to report on the breach as part of an ongoing effort against stalkerware. [35] [36] SiegedSec and ByteMeCrew continued claiming breaches until ByteMeCrew's disbandment.[ citation needed ]
SiegedSec collaborated with hacktivist group KittenSec, sharing both "lulz" and anti-NATO motives during attacks on Romania, Greece, France, Chile, Panama, and Italy. [37] [38]
After releasing the Heritage Foundation chatlogs, SiegedSec announced that they would be disbanding "for our own mental health, the stress of mass publicity, and to avoid the eye of the FBI." [39]
Following the Idaho National Laboratory attack, it was announced that the FBI as well as the Cybersecurity and Infrastructure Security Agency had been contacted to help investigate the incident. [40]
After a claimed hack, NATO announced it was investigating claims of a databreach on its infrastructure. A NATO official claimed no impact on missions, operations, or military deployments, yet additional cyber security measures were taken to improve security. [41]
Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.
The Internet has a long history of turbulent relations, major maliciously designed disruptions, and other conflicts. This is a list of known and documented Internet, Usenet, virtual community and World Wide Web related conflicts, and of conflicts that touch on both offline and online worlds with possibly wider reaching implications.
Jeremy Alexander Hammond, also known by his online moniker sup_g, is an American anarchist activist and former computer hacker from Chicago. He founded the computer security training website HackThisSite in 2003. He was first imprisoned over the Protest Warrior hack in 2005 and was later convicted of computer fraud in 2013 for hacking the private intelligence firm Stratfor and releasing data to WikiLeaks, and sentenced to 10 years in prison.
Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.
LulzSec was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist Hector Monsegur, who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. Prior, British authorities had announced the arrests of two teenagers they alleged were LulzSec members, going by the pseudonyms T-flow and Topiary.
Teamp0ison was a computer security research group consisting of 3 to 5 core members. The group gained notoriety in 2011/2012 for its blackhat hacking activities, which included attacks on the United Nations, NASA, NATO, Facebook, Minecraft Pocket Edition Forums, and several other large corporations and government entities. TeaMp0isoN disbanded in 2012 following the arrests of some of its core members, "TriCk", and "MLT".
Anonymous is a decentralised virtual community. They are commonly referred to as an internet-based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.
Israeli Elite Force (iEF) is a hacktivism group founded two days before OpIsrael on April 5, 2013, that is responsible for multiple high-profile computer attacks and large scale online vandalism. Targets include ISPs, domain registrars, commercial websites, educational institutions, and government agencies. The group's core members are: mitziyahu, Buddhax, amenefus, bl4z3, r3str1ct3d, Mute, Cyb3rS74r, Oshrio, Aph3x, xxtr, Kavim, md5c, prefix, Cpt|Sparrow, gal-, gr1sha, nyxman and TheGodOfHell.
Ryan Ackroyd, a.k.a.Kayla and also lolspoon, is a former black hat hacker who was one of the six core members of the computer hacking group "LulzSec" during its 50-day spree of attacks from 6 May 2011 until 26 June 2011. Throughout the time, Ackroyd posed as a female hacker named "Kayla" and was responsible for the penetration of multiple military and government domains and many high profile intrusions into the networks of Gawker in December 2010, HBGaryFederal in 2011, PBS, Sony, Infragard Atlanta, Fox Entertainment and others. He eventually served 30 months in prison for his hacking activities.
Ghost Security, also known as GhostSec, is a self-described "vigilante" group that was formed to attack ISIS websites that promote Islamic extremism. It is considered an offshoot of the Anonymous hacking collective. According to experts of online jihad activism, the group gained momentum after the Charlie Hebdo shooting in Paris in January 2015. The group claims to have taken down hundreds of ISIS-affiliated websites or social media accounts and thwarted potential terrorist attacks by cooperating with law enforcement and intelligence agencies. The group uses social media hashtags like #GhostSec - #GhostSecurity or #OpISIS to promote its activities.
Phineas Fisher is an unidentified hacktivist and self-proclaimed anarchist revolutionary. Notable hacks include the surveillance company Gamma International, Hacking Team, the Sindicat De Mossos d'Esquadra and the ruling Turkish Justice and Development Party, three of which were later made searchable by WikiLeaks.
Maia arson crimew, formerly known as Tillie Kottmann, is a Swiss developer and computer hacker. Crimew is known for leaking source code and other data from companies such as Intel and Nissan, and for discovering a 2019 copy of the United States government's No Fly List on an unsecured cloud server owned by CommuteAir. Crimew was also part of a group that hacked into Verkada in March 2021 and accessed more than 150,000 cameras. She is also the founding developer of the Lawnchair application launcher for Android.
Cyber Partisans is a Belarusian decentralized anonymous hacktivist collective emerged in September 2020, known for its various cyber attacks against the authoritarian Belarusian government. The group is part of the broader Belarusian opposition movement.
During the prelude to the Russian invasion of Ukraine and the Russian invasion of Ukraine, multiple cyberattacks against Ukraine were recorded, as well as some attacks on Russia. The first major cyberattack took place on 14 January 2022, and took down more than a dozen of Ukraine's government websites. According to Ukrainian officials, around 70 government websites, including the Ministry of Foreign Affairs, the Cabinet of Ministers, and the National and Defense Council (NSDC), were attacked. Most of the sites were restored within hours of the attack. On 15 February, another cyberattack took down multiple government and bank services.
Powerful Greek Army or by the abbreviation "PGA" is a hacker group founded in 2016. The team has carried out numerous cyberattacks both in Greece and worldwide.
Anonymous, a decentralized international activist and hacktivist collective, has conducted numerous cyber-operations against Russia since February 2022 when the Russian invasion of Ukraine began.
BreachForums, sometimes referred to as Breached, is an English-language black hat–hacking crime forum. The website acted as an alternative and successor to RaidForums following its shutdown and seizure in 2022. Like its predecessor, BreachForums allows for the discussion of various hacking topics and distributed data breaches, pornography, hacking tools and various other services.