HomeCII/OTUserSec's Collaboration with Bear IT Army: A Worrisome Development

UserSec’s Collaboration with Bear IT Army: A Worrisome Development

Published on

spot_img

In recent news, it has been reported that the pro-Russian hacker group known as ‘UserSec’ has expanded its list of alliances by adding another group to its network — Bear IT Army. This collaboration between UserSec and Bear IT Army is significant as it further expands the partnerships among Pro-Russian cybercriminals who are supporting the country in its ongoing war against Ukraine.

Ever since the outbreak of the war, pro-Russia hackers have been teaming up to target countries that are pro-Ukraine, particularly NATO countries. This international conflict has not only triggered physical warfare but also a cyberwar, where hackers aligned with each nation persistently seek to undermine the other through cyber attacks.

The collaboration between UserSec and Bear IT Army marks yet another example of cybercriminals joining forces, following the footsteps of Anonymous Sudan and Killnet. With this new alliance, it becomes imperative for targeted nations to enhance their cybersecurity measures and trace the culprits who are grouping against them. However, not much is known about the Bear IT Army cybercriminal group, other than the fact that it uses the Bear image and targets European nations’ websites in a similar fashion as the NoName Group.

This collaboration between UserSec and Bear IT Army is the latest addition to a growing list of geopolitical hacker collaborations that have emerged in recent months. Aside from Russian hackers, groups from India and Egypt have also been spotted engaging in such alliances.

Last week, UserSec announced its collaboration with pro-Russian ATPs (Advanced Persistent Threats) from several other nations, with the Romanian medical sector being listed as their joint target. This effort aligns with their previous announcement a month ago when UserSec targeted NATO member states in response to the Russian invasion of Ukraine. The group specifically targeted Western governments and organizations that provided Ukraine with strategic and military support.

KillNet, which is probably the most well-known among pro-Russian hacker groups, joined forces with UserSec in their cyber attacks against NATO nations. Additionally, KillNet has publicly stated that it will offer hacking services to state-sponsored entities and private organizations. These actions were likely influenced by NATO’s Secretary General visiting Ukraine, which might have spurred the hackers’ desire to invade NATO nations’ websites.

It is worth mentioning that UserSec also recently claimed to collaborate with eight other hacker groups, including TeslaBotnet, NetSide, and Indian Cyber Force. However, the authenticity of this claim could not be confirmed.

In terms of cyber attacks against Ukraine, several groups have been actively involved. The NoName hackers, for instance, have recently launched attacks on the Ukrainian financial sector. Another group called Kromsec exploited a vulnerability to steal information from the French Ministry of Justice, while UserSec targeted Stockholm’s Arlanda Airport.

In a recent development, a British man named Joseph James O’Connor was apprehended for hacking the Twitter accounts of several celebrities and politicians in 2020. He was arrested in Spain and has been sentenced to five years in prison. It is important to not only apprehend cyber criminals but also deter them from returning to cybercrime in order to weaken the network of hackers.

In conclusion, the collaboration between UserSec and Bear IT Army highlights the ongoing efforts of pro-Russian cybercriminals to target countries supporting Ukraine in the war. This alliance, along with other geopolitical hacker collaborations, emphasizes the need for increased cybersecurity measures and the tracing of these cybercriminals. The war between nations has extended to the cyber realm, and it is crucial for targeted nations to remain vigilant in defending against these attacks.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...