Thursday, April 24, 2025
Homecyber securityAnonymous Group Hacked Russian Oil Pipeline Giant and Released 79 GB of...

Anonymous Group Hacked Russian Oil Pipeline Giant and Released 79 GB of Stolen Data

Published on

SIEM as a Service

Follow Us on Google News

Cyberattacks on Russia have been on the rise since their invasion of Ukraine. On February 25th, the Anonymous group posted on Twitter, “The Anonymous Collective is officially in cyberwar against the Russian government”. Anonymous has been infiltrating several Russian organizations ever since.

Most of the businesses were Russian-state backed. Several hackers from around the world have been involved in cyber warfare against Russia. One the oil company Rosneft have been recently hit with a cyber attack. Following this, the Russian state-controlled oil pipeline giant, Transneft, is now hit. 

Distributed Denial of Secrets is one of the underground hosting websites in which many hackers publish their data leaks. On Thursday, Anonymous posted a link that contained nearly 79 GB of emails from Omega, the Research and Development division of Transneft. 

- Advertisement - Google News

Transneft is considered to be the largest pipeline company in the world. Since it was a state-owned Enterprise of Russia, investments from the US market were blocked following the Russian invasion. Omega was the R&D of Transneft which was manufacturing high-tech instruments for temperature monitoring and leak detection systems.

The link contained email addresses of employees, invoices, shipping details, and other images about server rack and system configurations. The last timestamp on emails was dated March 15th, 2022 which was just a few days before the data leak.

Following this, Anonymous dedicated this hack to Hilary Clinton. It is assumed that the hackers dedicated this to Hilary Clinton in accordance with her interview with MSNBC. She said, “People who love freedom, and understand that our way of life depends on supporting those who believe in freedom as well, could be engaged in cyber support of those in the streets in Russia”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash...

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of...

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score...