The KittenSec hacker group has claimed responsibility for cyber attacks on various entities in Panama and Chile, as well as the Italian Ministry of Justice. The group alleges that they have gained access to citizens’ data from these victims, although the credibility of this claim has yet to be verified. The victims of these attacks have not issued an official statement regarding the matter.
The KittenSec hacker group made the announcement through a statement posted on Twitter. In the statement, they identified the targets of their attacks and claimed to have obtained approximately 2,000,000 citizen data rows from Panama and about 10,000,000 citizen records from Chile.
What makes the situation even more complex is that the threat actor’s post hints at the possibility of more data leaks in the future. The group promises to maintain “high data quality” standards in their future operations. The KittenSec hacker group is known for carrying out high-profile cyber attack campaigns. Over the past few months, they have targeted government organizations in various parts of the world.
One of their recent operations, known as #OpRomania, involved the defacement of the Romanian government’s website. The group communicated their intent through popular social media platforms and directed their followers to their Telegram channel. The leaked data from this operation included information from Romanian-state-related services and European databases. It was disseminated through a massive zip file named “Romania Leaks [KittenSec].zip.” The file contained around 25GB of data.
The KittenSec hacker group’s behavior sets them apart from other ransomware gangs. While many threat groups are driven by financial motives, the KittenSec hacker group claims to steal and leak data without any monetary gain. They even provide a Monero address for donations on the dark web, emphasizing their commitment to conducting these data leaks for non-financial reasons.
Despite their presence on the dark web, the KittenSec hacker group remains relatively mysterious. Unlike other ransomware gangs, they have a particular interest in government data and have carried out multiple attacks with similar intentions in the past. In a previous attack, they claimed to have gained access to data from the French internet provider free.fr. The group released the compromised data, which included employee lists and other valuable information. They also hinted at future targets and endeavors.
It is important to note that this report is based on internal and external research obtained through various means. The information provided is for reference purposes only, and users are responsible for their reliance on it. The Cyber Express assumes no liability for the accuracy or consequences of using this information.
