Pro-Ukraine hackers have compromised a massive quantity of Russian cloud databases, deleting knowledge, renaming files and probably exfiltrating data for potential attacks, scientists have verified.
Jeremiah Fowler and a workforce at Web page Planet decided to glance at the marketing campaign to “hack back” at Russian entities following the invasion of Ukraine.
The Nameless hacking collective declared on February 24 that it was “officially in cyber war” in opposition to the Russian governing administration, even though the Ukrainian vice primary minister, Mykhailo Fedorov, is organizing a volunteer “IT army” of hackers via Telegram to strike Russian targets.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Fowler uncovered that their endeavours are starting up to bear fruit. Out of a random sample of 100 misconfigured Russian cloud databases identified by means of IoT engines and other legitimate strategies, 92 had been compromised.
In the bulk of these scenarios, attackers totally wiped the dataset with a script comparable to the infamous MeowBot. Data files were also renamed with pro-Ukrainian messages this sort of as “putin end this war,” “no war,” and “HackedByUkraine,” he reported.
One of the compromised databases belonged to the put up-Soviet Commonwealth of Independent States (CIS).
“Hundreds of folders in the databases experienced been renamed to ‘putin_stop_this_war.’ In addition to the hack, it seems that the database exposed extremely weak administrative qualifications and quite a few emails. This would also make workforce straightforward targets for social engineering to obtain entry deeper in the business or social engineering,” Fowler explained.
“We do not know if info was downloaded or what the hackers plan to do with this facts, but most likelihood these uncovered persons deal with true hazards of even more cyber steps.”
Hacktivists could theoretically use personal information and facts uncovered in this kind of attacks to concentrate on people with spear-phishing and/or destructive malware.
Other notable finds were being a dataset managed by Russian internet service provider “Green Dot” and a trove that contains “a incredibly significant number” of top secret keys referencing Russian email giant mail.ru as the host server.
Even though specific attribution is demanding, “we can only think they are affiliated with or supporters of Nameless dependent on the timeline of when the Russian databases were being qualified,” Fowler reported of the hackers liable.
The information arrives as the Russian government yesterday revealed hackers had brought on short-term outages of a number of company websites by focusing on an externally loaded widget utilised to accumulate customer figures.
Some components of this report are sourced from:
www.infosecurity-magazine.com