Share this article on:
While monetary gain has long been the predominant motive for cyber attacks, the rapidly changing geopolitical and social landscape has seen hacktivism become increasingly prevalent and dangerous. We have witnessed an enormous increase in the number and claimed impact of hacktivist attacks over the past year, with the goal of spreading a message or causing physical disruption leading to significant real-world consequences.
While these attacks aim to cause disruption to wider political and social agendas, organisations, especially those operating in critical infrastructure, are often the direct victims.
Hacktivist groups that took the stage in 2022
Much like activists, politically and socially aligned cyber criminals are coming together to spread their message, cause disruption, and make an impact on global issues. Over the past 12 months, the war in Ukraine has been repeatedly impacted by hacktivists, and governments are increasingly aware of the potential impact these groups can have.
In 2022, a range of hacktivist groups came into the public light:
Organisations caught in the crossfire
In most cases, hacktivist attacks are largely opportunistic, focusing on a country or industry rather than a particular organisation. However, many organisations that operate within the targeted country or sector can be caught in the crossfire of these attacks. Once the initial target scope is defined, some groups will focus on large-scale attacks by finding similar device models in several organisations and attacking them simultaneously.
Critical infrastructures often fall victim to these threats as they largely operate with OT devices and equipment. Industries such as utilities and manufacturing become expected targets; however, due to the widespread use of IoT and OT equipment, such as UPS, VoIP, and building automation controllers, industries such as telecommunications and retail also fall victim. It is important to note that hacktivists aim to cause disruption for governments and countries, so sectors and organisations that have the greatest impact on the wider public will become prime targets. Forescout found that nearly two-thirds (65 per cent) of all hacktivist attacks have occurred on telecommunication (34 per cent), utilities (23 per cent), and manufacturing (8 per cent) organisations. Of all successful attacks, the most common end goal for hacktivists was manipulation and control of the network (79 per cent), with the second aim being to destruct data (9 per cent).
Although organisations may not have specifically provoked hacktivist groups themselves, this does not mean they shouldn’t prepare for becoming a target of these attacks. Moving forward, organisations — especially critical infrastructure — should ensure their unmanaged devices, such as IoT and OT equipment, are appropriately protected.
Protecting against the cyber protests
As hacktivism continues to grow, cyber hygiene practices such as hardening, network segmentation, and monitoring must be extended to encompass every device in an organisation, not only traditional, IT and managed devices.
Organisations need to:
Hacktivist attacks will not slow down, as cyber evolution and political agendas will never fade. As critical infrastructure remains a primary target, organisations with IoT and OT infrastructure should review their cyber hygiene and, furthermore, how to protect all devices across their landscape.
By doing this, organisations can mitigate their odds of falling victim to hacktivist disruption.
Hamish Armati is the director of technical services (APJ) at Forescout Technologies.