DataBreaches.net

DataBreaches.net

The Office of Inadequate Security

Menu
  • Breach Laws
  • About
  • Donate
  • Contact
  • Privacy
  • Transparency Reports
Menu

In Act of Hacktivism, Open Source Project Maintainer Uses Code to Wipe Russian and Belarusian Computers

Posted on March 27, 2022 by Dissent

Scott Ikeda reports:

Many criminal hacking gangs originate from Russia and nearby points in Eastern Europe, and their ransomware and malware is sometimes found with settings that automatically disable it if regional languages are set on the target computer. An open source project maintainer essentially did the opposite in protest of the war in Ukraine, targeting computers with an IP address in Russia or Belarus with an update. The act of attempted “hacktivism” was supposed to leave a “message of peace” on these computers, but instead started overwriting files with a heart symbol.

The incident has caused an uproar in the free and open source software (FOSS) community, and adds to an ongoing debate about the validity and strategic usefulness of targeting random civilians for the actions of their government.

Read more at CPO Magazine.

Related Posts:

  • 'I can fight with a keyboard': How one Ukrainian IT…
  • Hacktivists Claim Ransomware Strike on Belarus…
  • Russian hackers tried to sabotage Ukrainian power…
  • Belarus conducted widespread phishing campaigns…
  • Russian hacker Pavel Sitnikov arrested for sharing…

Post navigation

← Data of 820,000 NYC students compromised in hack of online grading system: Education Dept.
FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List →

Sponsored or Paid Posts

This site doesn’t accept sponsored posts and doesn’t respond to requests about them.

Have a News Tip?

Email:

Breaches[at]Protonmail.ch
Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Telegram: @DissentDoe

Browse by News Section

Latest Posts

  • Update: Cardiovascular Consultants Ltd. ransomware attack reportedly affected 500,000 patients, guarantors, and staff
  • Data breach by Addenbrooke’s Hospital reveals patient information
  • Millions of patient scans and health records spilling online thanks to decades-old protocol bug
  • Cybersecurity: Federal Agencies Made Progress, but Need to Fully Implement Incident Response Requirements (GAO Report)
  • Hackers Exploited ColdFusion Vulnerability to Breach Federal Agency Servers
  • CBIZ KA Notice of Data Privacy Incident (Prime Healthcare)
  • Seeking clarification on Maine’s data breach notification statute
  • East River Medical Imaging notifies 605,809 patients of breach

Please Donate

If you can, please donate XMR to our Monero wallet because the entities whose breaches we expose are definitely not supporting our work and are generally trying to chill our speech!

Donate- Scan QR Code   Donate!

Social Media

Find me on Infosec.Exchange.

I am also on Telegram @DissentDoe.

RSS

Grab the RSS Feed

Copyright

© 2009 – 2023, DataBreaches.net and DataBreaches LLC. All rights reserved.

HIGH PRAISE, INDEED!

“You translate “Nerd” into understandable “English” — Victor Gevers of GDI Foundation, talking about DataBreaches.net

©2023 DataBreaches.net