TurkHackTeam

Last updated
TurkHackTeam
Formation2002
FounderArsenik
Type Kemalist hacktivist group
Official language
Turkish
Website https://www.turkhackteam.org/

TurkHackTeam is a Turkish nationalist hacker group founded in 2002. Ideologically they are Kemalists and define themselves as the "Turkish Cyber Army". [1] [2]

They state that their goal is to fight against all kinds of cyber threats against Turkey. They have appeared on news headlines on many international news portals. [3] [4]

History

The group claimed responsibility for the hacking of the pro-Kurdish Democratic Society Party's website in 2008. [5] [6] [7] [8]

TurkHackTeam went on a spree of attacking Iranian and Russian websites in 2016 amid the Syrian civil war. [9] During rising tensions in the Nagorno-Karabakh conflict, they participated in cyberwarfare against Armenian hackers. [10] In 2017, for unknown reasons, they hacked the official website of the UK Police. [11] In March 2017, during a brief period of tensions between the Netherlands and Turkey, the TurkHackTeam launched their "Netherlands Operation" where they hacked and defaced over 250 Dutch websites in less than a month. [12]

They also hacked Star Alliance. [13] TurkHackTeam is also a platform that prepares social projects. The first of the projects was to send morale letters to the soldiers and police after the 2016 Turkish coup attempt. [14] In the same year, they distributed food in Africa through an association. [15] Later, some group members gathered on 10 November and went to visit Anıtkabir, the mausoleum of Mustafa Kemal Atatürk. [16] In 2017, the group, which collected books from its members, donated these books to secondary and high schools, and created libraries. [17]

At the beginning of February 2024, the hacker group claimed responsibility for the attack on La Poste and Crédit Agricole. According to the first elements this is a Denial-of-service attack. They also stood out in 2023 for hacking the ANSSI Telegram page. [18] [19]

Related Research Articles

<span class="mw-page-title-main">Denial-of-service attack</span> Type of cyber-attack

In computing, a denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to a network. Denial of service is typically accomplished by flooding the targeted machine or resource with superfluous requests in an attempt to overload systems and prevent some or all legitimate requests from being fulfilled. The range of attacks varies widely, spanning from inundating a server with millions of requests to slow its performance, overwhelming a server with a substantial amount of invalid data, to submitting requests with an illegitimate IP address.

<span class="mw-page-title-main">Anonymous (hacker group)</span> Decentralized hacktivist group

Anonymous is a decentralized international activist and hacktivist collective and movement primarily known for its various cyberattacks against several governments, government institutions and government agencies, corporations and the Church of Scientology.

<span class="mw-page-title-main">Cyberattacks during the Russo-Georgian War</span> Series of cyber attacks during Russo-Georgian war in 2008

During the Russo-Georgian War, a series of cyberattacks swamped and disabled websites of numerous South Ossetian, Georgian, Russian and Azerbaijani organisations. The attacks were initiated three weeks before the shooting war began.

Cyberwarfare by Russia includes denial of service attacks, hacker attacks, dissemination of disinformation and propaganda, participation of state-sponsored teams in political blogs, internet surveillance using SORM technology, persecution of cyber-dissidents and other active measures. According to investigative journalist Andrei Soldatov, some of these activities were coordinated by the Russian signals intelligence, which was part of the FSB and formerly a part of the 16th KGB department. An analysis by the Defense Intelligence Agency in 2017 outlines Russia's view of "Information Countermeasures" or IPb as "strategically decisive and critically important to control its domestic populace and influence adversary states", dividing 'Information Countermeasures' into two categories of "Informational-Technical" and "Informational-Psychological" groups. The former encompasses network operations relating to defense, attack, and exploitation and the latter to "attempts to change people's behavior or beliefs in favor of Russian governmental objectives."

Emine Ayna, is Turkish Kurd politician She was a member of the former Democratic Society Party (DTP). She joined the Peace and Democracy Party (BDP), after the Constitutional Court banned DTP on 11 December 2009.

<span class="mw-page-title-main">Operation Payback</span> Series of cyberattacks conducted by Anonymous

Operation Payback was a coordinated, decentralized group of attacks on high-profile opponents of Internet piracy by Internet activists using the "Anonymous" moniker. Operation Payback started as retaliation to distributed denial of service (DDoS) attacks on torrent sites; piracy proponents then decided to launch DDoS attacks on piracy opponents. The initial reaction snowballed into a wave of attacks on major pro-copyright and anti-piracy organizations, law firms, and individuals. The Motion Picture Association of America, the Pirate Party UK and United States Pirate Party criticised the attacks.

Anonymous is a decentralized virtual community. They are commonly referred to as an internet-based collective of hacktivists whose goals, like its organization, are decentralized. Anonymous seeks mass awareness and revolution against what the organization perceives as corrupt entities, while attempting to maintain anonymity. Anonymous has had a hacktivist impact. This is a timeline of activities reported to be carried out by the group.

In 2013, there were two major sets of cyberattacks on South Korean targets attributed to elements within North Korea.

RedHack is a Turkish Marxist-Leninist computer hacker group founded in 1997. The group has claimed responsibility for hacking the websites of institutions which include the Council of Higher Education, Turkish police forces, the Turkish Army, Türk Telekom, and the National Intelligence Organization others. The group's core membership is said to be twelve. RedHack is the first hacker group which has been accused of being a terrorist organization and circa 2015 is one of the world's most wanted hacker groups.

Lizard Squad Hacker group

Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service (DDoS) attacks primarily to disrupt gaming-related services.

<span class="mw-page-title-main">Islamic State Hacking Division</span>

The Islamic State Hacking Division (ISHD) or The United Cyber Caliphate(UCC) is a merger of several hacker groups self-identifying as the digital army for the Islamic State of Iraq and Levant (ISIS/ISIL). The unified organization comprises at least four distinct groups, including the Ghost Caliphate Section, Sons Caliphate Army (SCA), Caliphate Cyber Army (CCA), and the Kalashnikov E-Security Team. Other groups potentially involved with the United Cyber Caliphate are the Pro-ISIS Media group Rabitat Al-Ansar (League of Supporters) and the Islamic Cyber Army (ICA). Evidence does not support the direct involvement of the Islamic State leadership. It suggests external and independent coordination of Pro-ISIS cyber campaigns under the United Cyber Caliphate(UCC) name. Investigations also display alleged links to Russian Intelligence group, APT28, using the name as a guise to wage war against western nations.

Lazarus Group is a hacker group made up of an unknown number of individuals, alleged to be run by the government of North Korea. While not much is known about the Lazarus Group, researchers have attributed many cyberattacks to them between 2010 and 2021. Originally a criminal group, the group has now been designated as an advanced persistent threat due to intended nature, threat, and wide array of methods used when conducting an operation. Names given by cybersecurity organizations include Hidden Cobra and ZINC or Diamond Sleet. According to North Korean defector Kim Kuk-song, the unit is internally known in North Korea as 414 Liaison Office.

Mirai is malware that turns networked devices running Linux into remotely controlled bots that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as IP cameras and home routers. The Mirai botnet was first found in August 2016 by MalwareMustDie, a white hat malware research group, and has been used in some of the largest and most disruptive distributed denial of service (DDoS) attacks, including an attack on 20 September 2016 on computer security journalist Brian Krebs' website, an attack on French web host OVH, and the October 2016 Dyn cyberattack. According to a chat log between Anna-senpai and Robert Coelho, Mirai was named after the 2011 TV anime series Mirai Nikki.

<span class="mw-page-title-main">Deflect.ca</span> DDoS mitigation and website security service

Deflect is a DDoS mitigation and website security service by eQualitie, a Canadian social enterprise developing open and reusable systems with a focus on privacy, resilience and self-determination, to protect and promote human rights and press freedom online.

<span class="mw-page-title-main">2022 Ukraine cyberattacks</span> Attack on Ukrainian government and websites

During the prelude to the 2022 Russian invasion of Ukraine and the 2022 Russian invasion of Ukraine, multiple cyberattacks against Ukraine were recorded, as well as some attacks on Russia. The first major cyberattack took place on 14 January 2022, and took down more than a dozen of Ukraine's government websites. According to Ukrainian officials, around 70 government websites, including the Ministry of Foreign Affairs, the Cabinet of Ministers, and the National and Defense Council (NSDC), were attacked. Most of the sites were restored within hours of the attack. On 15 February, another cyberattack took down multiple government and bank services.

Killnet is a pro-Russia hacker group known for its DoS and DDoS attacks towards government institutions and private companies in several countries during the 2022 Russian invasion of Ukraine. The group is thought to have been formed sometime around March 2022.

NoName057(16) is a pro-Russian hacker group that first declared itself in March 2022 and claimed responsibility for cyber-attacks on Ukrainian, American and European government agencies, media, and private companies. It is regarded as an unorganized and free pro-Russian activist group seeking to attract attention in Western countries.

Anonymous Sudan is a hacker group that has been active since mid-January 2023 and believed to be originated from Russia with no links to Sudan or Anonymous. They have launched a variety of distributed denial-of-service (DDoS) attacks against targets.

References

  1. "Arşivlenmiş kopya". zone-h.org. Archived from the original on 5 December 2019. Retrieved 25 June 2021.
  2. "Forum Görevlileri". turkhackteam.org. Archived from the original on 21 December 2006. Retrieved 31 July 2020.
  3. Habertürk. "Turk Hack Team üyesi Türk hacker Vatikan'ın sitesine saldırdı". Habertürk (in Turkish). Retrieved 2023-12-08.
  4. Viebeck, Elise (2015-04-14). "Reports: Hackers hit Vatican website over 'genocide' comment". The Hill. Retrieved 2023-12-08.
  5. "Demokratik Toplum Partisi (DTP) Resmi Sitesi Hacked // YeniceriX". turkhackteam (in Turkish). turkhackteam.org. 11 September 2008. Archived from the original on 19 April 2016. Retrieved 31 July 2020.
  6. Habertürk. "DTP'nin resmi internet sitesi hacklendi". Habertürk (in Turkish). Retrieved 2023-12-08.
  7. "DTP\'nin sitesi hacklendi / YENİ". www.memurlar.net (in Turkish). Retrieved 2023-12-08.
  8. "DTP HACKLENDİ". Ensonhaber (in Turkish). 2008-10-23. Retrieved 2023-12-08.
  9. "Turk Hack Team Conducting DDoS Attacks on Iran and Russian Websites". www.hackread.com. 2016-01-21. Retrieved 2023-12-08.
  10. "It's Cyberwar, it's Turkish vs Armenian Hackers Amid Nagorno-Karabakh Dispute". www.hackread.com. 2016-04-03. Retrieved 2023-12-08.
  11. Hassan, Alizaib (2017-02-15). "UK Police Website Hacked by Turkish Hackers". The Hack Post. Retrieved 2023-12-08.
  12. "Turk Hack Team and the "Netherlands Operation" - ReliaQuest". www.reliaquest.com. 2017-03-29. Retrieved 2023-12-08.
  13. "The Türk Hack Team Claims Cyber Attack On Star Alliance". 2023-06-26. Retrieved 2023-12-08.
  14. "Mehmetçiğe Mektup Projesi". turkhackteam (in Turkish). turkhackteam.org. 17 September 2015. Archived from the original on 20 September 2015. Retrieved 31 July 2020.
  15. "THT Afrika Yardımı [ÖNEMLİ]". turkhackteam (in Turkish). turkhackteam.org. 31 May 2016. Archived from the original on 3 June 2016. Retrieved 31 July 2020.
  16. "THT 10 Kasım Anıtkabir Ziyareti". turkhackteam (in Turkish). turkhackteam.org. 30 October 2016. Archived from the original on 2 November 2016. Retrieved 31 July 2020.
  17. "THT Siber Eğitim Planlaması". turkhackteam (in Turkish). turkhackteam.org. 27 January 2017. Archived from the original on 29 January 2017. Retrieved 31 July 2020.
  18. Alexandre Boero (6 February 2024). "Les sites internet de La Poste ont subi une énorme panne, qui serait due à une attaque informatique de type DDoS" (in French). Clubic . Retrieved 6 February 2024.
  19. Alexandre Boero (7 February 2024). "Crédit Agricole : une grosse cyberattaque paralyse les site et application de la banque ce mercredi" (in French). Clubic . Retrieved 7 February 2024.