HomeCII/OTGarnesia Team claims responsibility for cyber attack on French Ministry of Justice

Garnesia Team claims responsibility for cyber attack on French Ministry of Justice

Published on

spot_img

The French Ministry of Justice has recently experienced a cyber attack orchestrated by a hacking group known as the ‘Garnesia Team’. This incident adds to the growing number of hacktivist collectives that have emerged in recent years. Despite the breach, the Ministry of Justice’s website remained accessible to users.

When contacted by The Cyber Express, the French Ministry of Justice confirmed that the attack was a DDoS-style attack, which is different from ransomware attacks. The Garnesia Team did not make any ransom demands. Fortunately, there have been no reports of any compromise in the functioning of the justice.gouv.fr website, and it continues to operate smoothly without any issues.

The attack on the French Ministry of Justice is believed to be a Distributed Denial of Service (DDoS) attack. These types of attacks can last for varying lengths of time, depending on the tools used and the vulnerability of the target. In a DDoS attack, multiple requests are sent to a server or network, causing it to become overwhelmed with traffic and potentially leading to a system crash. After a successful attack, the network resources may remain unavailable to users.

The Garnesia Team posted a message on their Telegram page, stating that they had taken down the justice.gouv.fr website. They also included a checkhost link in the message to verify the accessibility of the targeted website. Furthermore, the hackers listed several other hacker groups that were allegedly associated with the DDoS attack on the French Ministry of Justice. These groups seem to align themselves with the motives of the cybercriminals and may have assisted in orchestrating the attack.

One of the hacker groups mentioned in the list, Garnesia_ID, was investigated by The Cyber Express, revealing some alarming results. It was discovered that the group had defaced two websites in India as part of their hacktivist activities. The targeted websites were the Netaji Subhas Chandra Bose Cancer Research Institute and Home Remedy. The defacement attacks on these websites aimed to draw attention to the hackers’ cause, with messages calling for proper treatment of Muslims in India.

The attack on the cancer research institute’s website was claimed by ‘XizB3f’, who voiced concerns about the treatment of Muslims and urged people to stop playing with their religion. The defacement attack on the Home Remedy website was claimed by a hacker named DrVee_404, and included derogatory comments about India and threats to destroy Indian websites. The hackers also mentioned Indonesian hackers and expressed support for Pakistan.

The defacement attacks were confirmed through Google search results, which showed that the websites had indeed been compromised. While the home pages of both websites remained defaced, other pages within the sites were accessible and unaffected by the cyber attack.

It is important to note that this report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users are advised to use it responsibly. The Cyber Express assumes no liability for the accuracy or consequences of using this information.

In conclusion, the French Ministry of Justice recently experienced a cyber attack conducted by the Garnesia Team. This attack was identified as a DDoS-style attack, resulting in no compromise of the ministry’s website. In addition, investigations revealed that the Garnesia Team had also defaced websites in India as part of their hacktivist activities. These incidents highlight the increasing presence of hacktivist collectives and the need for enhanced cybersecurity measures to protect against such attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...