More documents leaked by Edward Snowden have alleged that the UK Spy Agency launched a cyber attack on the hacker groups Lulzsec and Anonymous.
The cyber attacks were allegedly carried out by the Joint Threat Research Intelligence Group, which is part of the UK’s GCHQ.
According to the leaked information, the Joint Threat Research Intelligence Group launched a DDos (distributed denial of service) attack on IRC rooms that were used by members of Anonymous.
Operation Thunder: A Retaliatory Strike
This attack was part of an operation that was codenamed Operation Thunder, and followed the Anonymous attack on PayPal and credit card companies in 2011. The Anonymous attack, known as Operation Payback, was a series of coordinated cyber attacks targeting companies that had withdrawn support for WikiLeaks. PayPal, MasterCard, and Visa were among the high-profile targets, leading to significant disruptions in their services.
Operation Thunder was not just a simple retaliatory measure; it was a calculated move to disrupt the communication channels of Anonymous. By targeting IRC (Internet Relay Chat) rooms, the Joint Threat Research Intelligence Group aimed to dismantle the infrastructure that allowed Anonymous members to coordinate their activities. IRC rooms were crucial for Anonymous, serving as virtual meeting spaces where members could plan and execute their operations.
Infiltration and Identification
The report also says that members of the Joint Threat Research Intelligence Group infiltrated IRC rooms used by Anonymous to identify members of the hacker group. This infiltration was a critical component of Operation Thunder. By gaining access to these chat rooms, the UK Spy Agency could gather intelligence on the identities and activities of Anonymous members. This information was invaluable for both preemptive and reactive measures against future cyber attacks.
Infiltration efforts were not limited to passive observation. Agents actively engaged in conversations, posing as fellow hackers to gain trust and extract more detailed information. This method of social engineering allowed the Joint Threat Research Intelligence Group to map out the hierarchy and operational structure of Anonymous, making it easier to target key individuals and disrupt their activities.
The implications of these actions are significant. On one hand, they highlight the lengths to which government agencies are willing to go to protect national security and corporate interests. On the other hand, they raise ethical and legal questions about the methods used to combat cyber threats. The use of DDos attacks and infiltration tactics blurs the line between defense and offense in the realm of cyber warfare.
You can find out more information on what was revealed in the latest leaked documents by Edward Snowden over at NBC News at the link below.
Latest Geeky Gadgets Deals
Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.