Tuesday, February 11, 2025
HomeCyber AttackAnonymous Hacker Group Hit Russian Nuclear Institute and Leak Stolen Data

Anonymous Hacker Group Hit Russian Nuclear Institute and Leak Stolen Data

Published on

SIEM as a Service

Follow Us on Google News

The Anonymous group along with several other hacking groups have recently attacked the Russian nuclear institute and leaked all the compromised data.

Apart from this, they have also launched several cyberattacks against the Belarussian govt. organizations and private businesses. Due to these massive DDoS attacks, several websites of the Russian government become offline.

Anonymous Hit Russia

The recent attack was massive and could have severe consequences. This recent attack was launched by the Network Battalion 65, it’s an Anonymous-linked group.

In this attack, this hacking group has claimed that they have compromised and leaked more than 40,000 confidential documents of the Russian Nuclear Institute.

Apart from this, for further sabotage operations, the Network Battalion 65 has asked other community members to help them in interpreting the documents that are written in Cyrillic, since all these documents can contain confidential information.

The Russian nuclear institute that was attacked by Network Battalion 65 is in the role of surveying the safety of nuclear plants in Russia, and for this major reason, this group has been attacked.

Through other Twitter accounts that are used by other Anonymous-linked hacking groups, the news of the attack was re-launched. In this recent attack the operators of the Anonymous group has targeted the following websites of Russian media:-

  • TASS
  • Izvestia
  • Fontaka
  • RBC
  • Kommersant
https://twitter.com/ITarmyUA/status/1498378421046493190

Moreover, they have also attacked the websites of the banks in Belarus with massive DDoS attacks to take them down, and here below we have mentioned them below:-

  • http://belarusbank.by – DOWN
  • http://priorbank.by – DOWN
  • http://belinvestbank.by – DOWN

There are several hacking groups working in this Russia and Ukraine conflict, as some of them are working for Russia and some of them taking the side of Ukraine.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...