Thursday, March 28, 2024

Anonymous Group Hacked Russian Oil Pipeline Giant and Released 79 GB of Stolen Data

Cyberattacks on Russia have been on the rise since their invasion of Ukraine. On February 25th, the Anonymous group posted on Twitter, “The Anonymous Collective is officially in cyberwar against the Russian government”. Anonymous has been infiltrating several Russian organizations ever since.

Most of the businesses were Russian-state backed. Several hackers from around the world have been involved in cyber warfare against Russia. One the oil company Rosneft have been recently hit with a cyber attack. Following this, the Russian state-controlled oil pipeline giant, Transneft, is now hit. 

Distributed Denial of Secrets is one of the underground hosting websites in which many hackers publish their data leaks. On Thursday, Anonymous posted a link that contained nearly 79 GB of emails from Omega, the Research and Development division of Transneft. 

Transneft is considered to be the largest pipeline company in the world. Since it was a state-owned Enterprise of Russia, investments from the US market were blocked following the Russian invasion. Omega was the R&D of Transneft which was manufacturing high-tech instruments for temperature monitoring and leak detection systems.

The link contained email addresses of employees, invoices, shipping details, and other images about server rack and system configurations. The last timestamp on emails was dated March 15th, 2022 which was just a few days before the data leak.

Following this, Anonymous dedicated this hack to Hilary Clinton. It is assumed that the hackers dedicated this to Hilary Clinton in accordance with her interview with MSNBC. She said, “People who love freedom, and understand that our way of life depends on supporting those who believe in freedom as well, could be engaged in cyber support of those in the streets in Russia”.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity and hacking news updates.

Website

Latest articles

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...

Chinese Hackers Attacking Southeast Asian Nations With Malware Packages

Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two...

CISA Warns of Hackers Exploiting Microsoft SharePoint Server Vulnerability

Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in Microsoft...

Microsoft Expands Edge Bounty Program to Include WebView2!

Microsoft announced that Microsoft Edge WebView2 eligibility and specific out-of-scope information are now included...

Beware of Free Android VPN Apps that Turn Your Device into Proxies

Cybersecurity experts have uncovered a cluster of Android VPN applications that covertly transform user...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles