Forum discussion on Computer Crime

Answer the question

Answer the question

by Md Assaduzzaman -
Number of replies: 44

What is Hacktivism..?Explain with an real life example.

In reply to Md Assaduzzaman

Re: Answer the question

by Taslima Sathi -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.

In reply to Md Assaduzzaman

Re: Answer the question

by Rashiduzzaman Shakil -
Definition: An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).


Real-life Example of Hacktivism:
  • Distributed Denial of Service (DDoS) Attacks: Attacks which bring down websites or otherwise disrupt Internet activity by systematically sending so many requests to a server that it cannot handle the traffic and is rendered temporarily useless. Common examples include email bombing and web sit-ins.
  • Website Defacements: Attacks which change the content of websites, usually for the purpose of spreading a political message.
  • Internet Worms: Programs designed to spread themselves within a network, either for the purpose of disrupting activity or spreading a message.
In reply to Md Assaduzzaman

Re: Answer the question

by Bonna Akter -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life Example of Hactivism:

  • Anonymous blogging. Activists, whistleblowers and journalists use this tactic. It protects the blogger, while providing a platform for them to speak out about an issue, such as human rights violations or oppressive government regimes.
  • Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
  • Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.

In reply to Md Assaduzzaman

Re: Answer the question

by Tajul Islam Ayon -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place. This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

Operation Tunisia:
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.

Fighting Hacktivism:
Fighting hacktivism is a very difficult prospect. Firstly, many of the hacktivist organizations are only fighting oppression and misappropriation of funds, and promoting several humanitarian causes. If you look at the underlying prospects, these are social injustices that have long gone unanswered in many of these countries. In essence, it is a grassroots effort to try and gain political outcomes through antisocial methodologies and means. Furthermore, the groups have no central identity. They operate on electronic bulletin boards and other forums while posting their cryptic messages to social media to garner interest. This means that organizations will have to utilize defensive means internally to ensure that they don't fall victim to hacking activity.
In reply to Md Assaduzzaman

Re: Answer the question

by Farzana Akter -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life Example of Hactivism:
Anonymous blogging. Activists, whistleblowers and journalists use this tactic. It protects the blogger, while providing a platform for them to speak out about an issue, such as human rights violations or oppressive government regimes.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
In reply to Md Assaduzzaman

Re: Answer the question

by Jobear Al Mahomud -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place. This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

OpVenezuela:
In 2014, domestic uprisings in protest of Venezuelan government repression and censorship sparked an attack by the groups Anonymous, Lulzsec and Binary Guardians. This widespread campaign of DDoS attacks and government website defacing by these cyber actors was to protest the Maduro government. Furthermore, activists were able to gain access to the official Twitter account of President Maduro and posted tweets saying 'No se metan con los mejores, hacked by @LulzSecPeru' or 'Don't mess with the best.' The primary reasoning behind these hacks was directly related to the inability to air grievances and to political opposition against censorship and state violence.
Operation Tunisia:
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship
OpOlympicHacking:
Anonymous Brazil and ASO, acting as a hacker team, went after the Rio Olympic Games in August 2016. The protest was in response to the inordinate amount of funds the group felt were being spent on the Olympics, rather than meaningful purposes within Brazil itself. Again, coordinated DDoS attacks against certain targets, in conjunction with a series of information leaks on companies that assisted with funding the Olympic Games, were the primary attack vectors. National and local governments as well as sports organizations experienced DDoS and DoX or 'Dropping the box' attacks that leaked information and exposed sensitive data. Doxxing is the search for and publishing of private or identifying information about a particular individual or organization on the Internet, typically with malicious intent.
In reply to Md Assaduzzaman

Re: Answer the question

by Ismatara Nodi -
The act of misusing a computer system or network for a socially or politically motivated motive is known as hacktivism. Hacktivists are those who participate in hacktivism.

The real world Anonymous blogging is an example of hactivism. This is a strategy used by activists, whistleblowers, and journalists. It protects the blogger while also giving them a platform to speak out about issues like human rights abuses or oppressive authoritarian regimes.
Information is being leaked. This is a common activist strategy. An insider source will usually gain access to sensitive or classified material that implicates an individual, organization, or government agency in a negative conduct and make it public. Wikileaks is well-known for releasing leaked information.
Information is being leaked. This is a common activist strategy. Typically, an insider source will gain access to confidential information.
In reply to Md Assaduzzaman

Re: Answer the question

by Md.Moshiur Rahman -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.


Real life example of Hacktivism:

As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place.
This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

OpVenezuela:

In 2014, domestic uprisings in protest of Venezuelan government repression and censorship sparked an attack by the groups Anonymous, Lulzsec and Binary Guardians.
This widespread campaign of DDoS attacks and government website defacing by these cyber actors was to protest the Maduro government.
Furthermore, activists were able to gain access to the official Twitter account of President Maduro and posted tweets saying 'No se metan con los mejores,
hacked by @LulzSecPeru' or 'Don't mess with the best.' The primary reasoning behind these hacks was directly related to the inability to air grievances and to political opposition against censorship and state violence.

OpOlympicHacking:

Anonymous Brazil and ASO, acting as a hacker team, went after the Rio Olympic Games in August 2016. The protest was in response to the inordinate amount of funds the group felt were being spent on the Olympics,
rather than meaningful purposes within Brazil itself. Again, coordinated DDoS attacks against certain targets, in conjunction with a series of information leaks on companies that assisted with funding the Olympic Games,
were the primary attack vectors. National and local governments as well as sports organizations experienced DDoS and DoX or 'Dropping the box' attacks that leaked information and exposed sensitive data.
Doxxing is the search for and publishing of private or identifying information about a particular individual or organization on the Internet, typically with malicious intent.
In reply to Md Assaduzzaman

Re: Answer the question

by Fazlay Atif Maruf -
Definition: Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. The hacktivist who does such acts, such as defacing an organization’s website or leaking that organization’s information, aims to send a message through their activities and gain visibility for a cause they are promoting.

Real-life Example of Hacktivism:

Hacktivists use a wide range of tools and techniques to work towards their goals. They can include actions like:

Doxing: In this method, hacktivists gather sensitive information about a specific person or organization and make it public.
Blogging anonymously: This tactic is primarily used by whistleblowers, journalists, and activists to bring light to a specific issue while maintaining privacy.
DoS and DDoS attacks: This tactic aims to flood targeted computer systems or networks to prevent users from accessing them.
Information leaks: In this tactic, an insider source with access to sensitive or classified information (that implicates a specific individual or organization) makes it public.
Website replication: This method seeks to mirror a legitimate website, using a slightly different URL, to circumvent censorship rules.
In reply to Md Assaduzzaman

Re: Answer the question

by Faruq Hossain -
Hacktivism: Hacktivism is a type of social or political activism that involves breaking into a secure computer system and inflicting havoc. The hacktivist group Cult of the Dead Cow is reported to have created the term hacktivism, which is a combination of "hacking" and "activism."

Real life example :
When Julian Assange, the creator of the infamous WikiLeaks, revealed a collection of emails between Hillary Clinton and her campaign manager, it became one of the most well-known examples of hacktivism in real life.

The emails were allegedly sent by a gang of Russian hackers with the goal of swaying the election in Donald Trump's favor.

The stolen emails had a severe impact on Clinton's campaign, with many people blaming the scandal for her loss. The email thefts resulted in the indictment of 12 Russian hackers by the US Department of Justice. 2

The overall goal of WikiLeaks is to defend freedom of speech and media publishing, enrich our historical record, and promote people's right to make new history.
In reply to Md Assaduzzaman

Re: Answer the question

by Tanvir Rahman -
Hacktivism:
• Use of hacking to promote a political cause.
 • Some think hacktivism is modern civil disobedience
• Degree can range from mild to destructive 
 – Defacing websites 
 – Destroying data 
 – Denial of service.
 

Real-life example:   An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access.


In reply to Md Assaduzzaman

Re: Answer the question

by Kawsar Sikder -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists. An example of hacktivism is denial of service attack mainly known as DOS attack to shutdown system to prevent access of client.

Examples of hacktivism:
Anonymous blogging is when a hacktivist blogs under an anonymous name, oftentimes to protect a whistleblower who is exposing an injustice. It could be considered a form of free speech.
RECAP is software that provides free access to documents on the U.S.’s Public Access to Court Electronic Records (PACER) — RECAP is PACER spelled backward — to push a freedom-of-information agenda.
Website defacement is when hacktivists change the visual appearance of a website, oftentimes to push messaging that underscores a cause important to the hacktivist group.
Website redirects change the address of a website so that visitors are redirected to a site that supports a hacktivist’s agenda.
Website mirroring is a workaround for censored websites whereby hacktivists copy a censored website and post it on a site with a modified URL for all to see. It promotes freedom of information.
Denial of Service (DoS) or Distributed Denial of Service attacks (DDoS) prevent targets from accessing their computers and sometimes crash websites by installing traffic-inundating malware on them.
In reply to Md Assaduzzaman

Re: Answer the question

by Israt jahan Shoshe -
Definition: Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. The hacktivist who does such acts, such as defacing an organization’s website or leaking that organization’s information, aims to send a message through their activities and gain visibility for a cause they are promoting.

Real-life Example of Hacktivism:

Hacktivists use a wide range of tools and techniques to work towards their goals. They can include actions like:

Doxing: In this method, hacktivists gather sensitive information about a specific person or organization and make it public.
Blogging anonymously: This tactic is primarily used by whistleblowers, journalists, and activists to bring light to a specific issue while maintaining privacy.
DoS and DDoS attacks: This tactic aims to flood targeted computer systems or networks to prevent users from accessing them.
Information leaks: In this tactic, an insider source with access to sensitive or classified information (that implicates a specific individual or organization) makes it public.
Website replication: This method seeks to mirror a legitimate website, using a slightly different URL, to circumvent censorship rules.
In reply to Md Assaduzzaman

Re: Answer the question

by Ripon Mondal -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place. This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

Operation Tunisia:
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.

Fighting Hacktivism:
Fighting hacktivism is a very difficult prospect. Firstly, many of the hacktivist organizations are only fighting oppression and misappropriation of funds, and promoting several humanitarian causes. If you look at the underlying prospects, these are social injustices that have long gone unanswered in many of these countries. In essence, it is a grassroots effort to try and gain political outcomes through antisocial methodologies and means. Furthermore, the groups have no central identity. They operate on electronic bulletin boards and other forums while posting their cryptic messages to social media to garner interest. This means that organizations will have to utilize defensive means internally to ensure that they don't fall victim to hacking activity.
In reply to Md Assaduzzaman

Re: Answer the question

by Shamsia Afrin -
What is Hacktivism?
Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist.
A real-life example:
Distributed Denial of Service (DDoS) Attacks: Attacks that bring down websites or otherwise disrupt Internet activity by systematically sending so many requests to a server that it cannot handle the traffic and is rendered temporarily useless. Common examples include email bombing and web sit-ins.
Website Defacements: Attacks that change the content of websites, usually for the purpose of spreading a political message.
Internet Worms: Programs designed to spread themselves within a network, either for the purpose of disrupting activity or spreading a message.
*A Notable hacktivist event: In the late 1990s, the Hong Kong Blondes helped Chinese citizens get access to blocked websites by targeting the Chinese computer networks. The group identified holes in the Chinese internet system, particularly in the area of satellite communications.
In reply to Md Assaduzzaman

Re: Answer the question

by A. A. Md. Minhajur Rahman -
Hacktivism is a means of collective political or social activism manifest through hacking computers and networks. Hacktivism began as a sub-culture of hacking, gaming and web communities, and allowed technically-inclined individuals to use the connectivity and anonymity of the web to join together with others and operate towards common causes. As such, hacktivists were originally mostly young males who enjoyed surfing the web, visiting forums and newsgroups, sharing information on illegal download sites, chatting in “private rooms” and colluding with like-minded drifters of the net.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
In reply to Md Assaduzzaman

Re: Answer the question

by julker nine 182-15-2108 -
Hacking is nothing new to the world of computing. Ever since computers were created, there has been someone testing and tweaking them to find ways to make them perform. However, hacktivism is something new. The term was first coined in 1994, thanks to a group known as the Cult of the Dead Cow or cDc, specifically by a group member known as 'Omega'. Essentially, hacktivism is the methodology to use hacking as a form of political or social activism. Hacktivism involves dissent against actions or organizations in the form of digital processes and\or digital mediums to push a political agenda. The utilization of technological hacks or civil disobedience through direct action against organizations by way of electronic means is another definition. Its most simple defining characteristic is activism that is destructive, malicious and undermining to an organization, Internet, technology or political party/platform.
In reply to Md Assaduzzaman

Re: Answer the question

by dijodduti talukder -
Hacktivism is the demonstration of abusing a PC framework or organization for a socially or politically inspired reason. People who perform hacktivism are known as hacktivists.

Genuine Example of Hactivism:
Mysterious contributing to a blog. Activists, informants and writers utilize this strategy. It safeguards the blogger, while giving a stage to them to stand in opposition to an issue, like common liberties infringement or harsh government systems.
Spilling data. This is a famous extremist strategy. Commonly, an insider source will get to delicate or arranged data - - which embroils an individual, association or government office in a movement that thinks about adversely them - - and unveil it. WikiLeaks is known for distributing spilled information.
Spilling data. This is a famous extremist strategy. Commonly, an insider source will get to delicate or arranged data - - which embroils an individual, association or government office in a movement that thinks about adversely them - - and unveil it. WikiLeaks is known for distributing spilled information.
In reply to Md Assaduzzaman

Re: Answer the question

by Md. Abid Hasan -
A denial of service (DoS) attack, which shuts down a system to restrict consumer access, is an example of hacktivism. Other examples include giving citizens access to government-censored online pages or providing endangered groups with privacy-protected communication channels (such as Syrians during the Arab Spring).


Real-life example of Hacktivism
Attacks that systematically send so many requests to a server that it cannot handle the load and is made momentarily unusable, bringing down websites or generally disrupting Internet activity. Email bombing and web sit-ins are two common examples.
Website defacements are cyber-attacks that alter the content of websites, usually to propagate a political message.
Internet Worms are programs that are designed to spread throughout a network, either to interrupt activity or to propagate a message.
In reply to Md Assaduzzaman

Re: Answer the question

by Naima Azim (183-15-1015) -
Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. The hacktivist who does such acts, such as defacing an organization’s website or leaking that organization’s information, aims to send a message through their activities and gain visibility for a cause they are promoting.

For example, in 2014, Sony Pictures Entertainment was hacked by a group by the name of Guardians Of Peace (GOP) who obtained over 100 Terabytes of data including unreleased films, employee salary, social security data, passwords, and account information. GOP hacked various social media accounts and hijacked them by changing their passwords to diespe123 (die sony pictures entertainment) and posting threats on the pages.
In reply to Md Assaduzzaman

Re: Answer the question

by Anika Tafannum -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.
In reply to Md Assaduzzaman

Re: Answer the question

by Shah Newaj -
Hacktivism derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. The hacktivist who does such acts, such as defacing an organization’s website or leaking that organization’s information, aims to send a message through their activities and gain visibility for a cause they are promoting.

Real life example : One of the most well-known examples of hacktivism in real life is when Julian Assange, founder of the infamous WikiLeaks, leaked a collection of emails between Hillary Clinton and her campaign manager. The emails were said to have come from a group of Russian hackers whose objective was to tilt the election in Donald Trump's favor.The leaked emails negatively impacted the Clinton campaign, with many blaming her loss largely on the incident. The Department of Justice ultimately indicted 12 Russian hackers for the email hacks.WikiLeaks' general purpose is the defense of freedom of speech and media publishing, the improvement of our historical record, and the support of peoples' right to create new history.
In reply to Md Assaduzzaman

Re: Answer the question

by Shahida Akter -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.


Real life example of Hacktivism:

As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place.
This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

OpVenezuela:

In 2014, domestic uprisings in protest of Venezuelan government repression and censorship sparked an attack by the groups Anonymous, Lulzsec and Binary Guardians.
This widespread campaign of DDoS attacks and government website defacing by these cyber actors was to protest the Maduro government.
Furthermore, activists were able to gain access to the official Twitter account of President Maduro and posted tweets saying 'No se metan con los mejores,
hacked by @LulzSecPeru' or 'Don't mess with the best.' The primary reasoning behind these hacks was directly related to the inability to air grievances and to political opposition against censorship and state violence.

OpOlympicHacking:

Anonymous Brazil and ASO, acting as a hacker team, went after the Rio Olympic Games in August 2016. The protest was in response to the inordinate amount of funds the group felt were being spent on the Olympics,
rather than meaningful purposes within Brazil itself. Again, coordinated DDoS attacks against certain targets, in conjunction with a series of information leaks on companies that assisted with funding the Olympic Games,
were the primary attack vectors. National and local governments as well as sports organizations experienced DDoS and DoX or 'Dropping the box' attacks that leaked information and exposed sensitive data.
Doxxing is the search for and publishing of private or identifying information about a particular individual or organization on the Internet, typically with malicious intent
In reply to Md Assaduzzaman

Re: Answer the question

by Tariqul Islam -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life Example of Hactivism:
Anonymous blogging. Activists, whistleblowers and journalists use this tactic. It protects the blogger, while providing a platform for them to speak out about an issue, such as human rights violations or oppressive government regimes.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
In reply to Md Assaduzzaman

Re: Answer the question

by Md Robiul Alam Jidan -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

A real-life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place. This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

Operation Tunisia:
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship
OpOlympicHacking:
Anonymous Brazil and ASO, acting as a hacker team, went after the Rio Olympic Games in August 2016. The protest was in response to the inordinate amount of funds the group felt were being spent on the Olympics, rather than meaningful purposes within Brazil itself. Again, coordinated DDoS attacks against certain targets, in conjunction with a series of information leaks on companies that assisted with funding the Olympic Games, were the primary attack vectors.
In reply to Md Assaduzzaman

Re: Answer the question

by Md. Muzahidul Islam Khandakar -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.
In reply to Md Assaduzzaman

Re: Answer the question

by Md. Yeasin Sheikh -
We can split `Hacktivism` word into “Hack” and “Activism”. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

There are many acts to define as hacktivism, such as
  • Doxing: In this method, hacktivists gather sensitive information about a specific person or organization and make it public.
  • Blogging anonymously: This tactic is primarily used by whistleblowers, journalists, and activists to bring light to a specific issue while maintaining privacy.
  • DoS and DDoS attacks: This tactic aims to flood targeted computer systems or networks to prevent users from accessing them.
  • Information leaks: In this tactic, an insider source with access to sensitive or classified information (that implicates a specific individual or organization) makes it public.
  • Website replication: This method seeks to mirror a legitimate website, using a slightly different URL, to circumvent censorship rules.

We can recall the Bangladesh Bank Heist that happened on 5th February 2016 and steal $951 million from the Bangladesh Central Bank (BCB) in Dhaka. Much of this was eventually recovered, but the thieves still managed to get away with $81 million. The attempt is considered one of the biggest bank heists of all time.

There are others notable events like
  • Attack on Fine Gael website by Anonymous happened in 2011.
  • Operation Russia: unidentified hackers cracked emails of pro-Kremlin activists and officials happened in 2012

Current days some popular attacks are
  • Distributed Denial-of-Service (DDoS) Attacks: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic
  • Ransomware attack :Ransomware is a malware designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, cyberattackers place organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files.
  • Brute Force Attacks:Brute Force Attacks:A brute force attack is a hacking method that uses trial and error to crack passwords, login credentials, and encryption keys. It is a simple yet reliable tactic for gaining unauthorized access to individual accounts and organizations' systems and networks.


To prevent these attacks, we need to improve the system and ourselves.
In reply to Md Assaduzzaman

Re: Answer the question

by shajibur rahman Bappy -
hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).
In reply to Md Assaduzzaman

Re: Answer the question

by Jannat Dristy -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.


Real life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place.
This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

OpVenezuela:In 2014, domestic uprisings in protest of Venezuelan government repression and censorship sparked an attack by the groups Anonymous, Lulzsec and Binary Guardians.
This widespread campaign of DDoS attacks and government website defacing by these cyber actors was to protest the Maduro government.
Furthermore, activists were able to gain access to the official Twitter account of President Maduro and posted tweets saying 'No se metan con los mejores,
hacked by @LulzSecPeru' or 'Don't mess with the best.' The primary reasoning behind these hacks was directly related to the inability to air grievances and to political opposition against censorship and state violence.

OpOlympicHacking:Anonymous Brazil and ASO, acting as a hacker team, went after the Rio Olympic Games in August 2016. The protest was in response to the inordinate amount of funds the group felt were being spent on the Olympics,
rather than meaningful purposes within Brazil itself. Again, coordinated DDoS attacks against certain targets, in conjunction with a series of information leaks on companies that assisted with funding the Olympic Games,
were the primary attack vectors. National and local governments as well as sports organizations experienced DDoS and DoX or 'Dropping the box' attacks that leaked information and exposed sensitive data.
Doxxing is the search for and publishing of private or identifying information about a particular individual or organization on the Internet, typically with malicious intent.
In reply to Md Assaduzzaman

Re: Answer the question

by A. A. Md. Minhajur Rahman -
Simply put, hacktivism is the use of hacking techniques to further a political or social agenda. There is no single box for classifying hacktivists. They can be all over the spectrum when it comes to proficiency levels, target preference, choice of tools, and preferred tactics.
The Arab Spring
In 2011, in the face of government oppression in Tunisia, Tunis protestors had a difficult time getting the international media to notice what was happening in their country.

After hacktivist collective Anonymous embraced the cause, hackers around the globe became a megaphone, taking to social media and helping Tunisians to circumvent censorship and show the reality of the country. The group also launched repeated DDoS attacks against government websites.

Such actions proved effective in bringing international attention, and soon led to mass protests in Egypt, Syria, Libya, and much of the Middle East.
In reply to Md Assaduzzaman

Re: Answer the question

by Md Mohsin -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.


Real life example of Hacktivism:

As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place.
This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

OpVenezuela:

In 2014, domestic uprisings in protest of Venezuelan government repression and censorship sparked an attack by the groups Anonymous, Lulzsec and Binary Guardians.
This widespread campaign of DDoS attacks and government website defacing by these cyber actors was to protest the Maduro government.
Furthermore, activists were able to gain access to the official Twitter account of President Maduro and posted tweets saying 'No se metan con los mejores,
hacked by @LulzSecPeru' or 'Don't mess with the best.' The primary reasoning behind these hacks was directly related to the inability to air grievances and to political opposition against censorship and state violence.
In reply to Md Assaduzzaman

Re: Answer the question

by Md. Sabbir Hasan -
Hacktivism is a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow.

Example : An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups.
In reply to Md Assaduzzaman

Re: Answer the question

by Mazharul Alam -
Hacktivism is a social or political activist act that is carried out by breaking into and wreaking havoc on a secure computer system. Hacktivism is a mix of “hacking” and “activism” and is said to have been coined by the hacktivist group Cult of the Dead Cow.
An example,An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).
In reply to Md Assaduzzaman

Re: Answer the question

by Rasel Hider Nobin -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.
In reply to Md Assaduzzaman

Re: Answer the question

by MD. Sadiqur Rahman -
We can split `Hacktivism` word into “Hack” and “Activism”. Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

There are many acts to define as hacktivism, such as
Doxing: In this method, hacktivists gather sensitive information about a specific person or organization and make it public.
Blogging anonymously: This tactic is primarily used by whistleblowers, journalists, and activists to bring light to a specific issue while maintaining privacy.
DoS and DDoS attacks: This tactic aims to flood targeted computer systems or networks to prevent users from accessing them.
Information leaks: In this tactic, an insider source with access to sensitive or classified information (that implicates a specific individual or organization) makes it public.
Website replication: This method seeks to mirror a legitimate website, using a slightly different URL, to circumvent censorship rules.
In reply to Md Assaduzzaman

Re: Answer the question

by Mariam Ananna -
Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist.

A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.
In reply to Md Assaduzzaman

Re: Answer the question

by Shadia Afrin -
Hacking is nothing new to the world of computing. Ever since computers were created, there has been someone testing and tweaking them to find ways to make them perform. However, hacktivism is something new. The term was first coined in 1994, thanks to a group known as the Cult of the Dead Cow or cDc, specifically by a group member known as 'Omega'. Essentially, hacktivism is the methodology to use hacking as a form of political or social activism. Hacktivism involves dissent against actions or organizations in the form of digital processes and\or digital mediums to push a political agenda. The utilization of technological hacks or civil disobedience through direct action against organizations by way of electronic means is another definition. Its most simple defining characteristic is activism that is destructive, malicious and undermining to an organization, Internet, technology or political party/platform.

Derived from combining the words 'Hack' and 'Activism', hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist.
An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).
In reply to Md Assaduzzaman

Re: Answer the question

by Md. Zahir Rayhan -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks on anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for the oppression of speech and censorship.
In reply to Md Assaduzzaman

Re: Answer the question

by Mokhlesur Rahman -
Definition: Derived from combining the words ‘Hack’ and ‘Activism’, hacktivism is the act of hacking, or breaking into a computer system, for politically or socially motivated purposes. The individual who performs an act of hacktivism is said to be a hacktivist. The hacktivist who does such acts, such as defacing an organization’s website or leaking that organization’s information, aims to send a message through their activities and gain visibility for a cause they are promoting.

Real-life Example of Hacktivism:

Hacktivists use a wide range of tools and techniques to work towards their goals. They can include actions like:

Doxing: In this method, hacktivists gather sensitive information about a specific person or organization and make it public.
Blogging anonymously: This tactic is primarily used by whistleblowers, journalists, and activists to bring light to a specific issue while maintaining privacy.
DoS and DDoS attacks: This tactic aims to flood targeted computer systems or networks to prevent users from accessing them.
Information leaks: In this tactic, an insider source with access to sensitive or classified information (that implicates a specific individual or organization) makes it public.
Website replication: This method seeks to mirror a legitimate website, using a slightly different URL, to circumvent censorship rules.
In reply to Md Assaduzzaman

Re: Answer the question

by ABDUR RAHMAN -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life example of Hacktivism:
As hacktivism is a newer concept, is important to identify some of the larger incidents of hacktivism and identify reasons that these incidents took place. This will assist in helping organizations understand some of the impetus behind hacktivism and perhaps analyze methods that they can utilize to avoid becoming a victim of hacktivism.

Operation Tunisia:
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.

Fighting Hacktivism:
Fighting hacktivism is a very difficult prospect. Firstly, many of the hacktivist organizations are only fighting oppression and misappropriation of funds, and promoting several humanitarian causes. If you look at the underlying prospects, these are social injustices that have long gone unanswered in many of these countries. In essence, it is a grassroots effort to try and gain political outcomes through antisocial methodologies and means. Furthermore, the groups have no central identity. They operate on electronic bulletin boards and other forums while posting their cryptic messages to social media to garner interest. This means that organizations will have to utilize defensive means internally to ensure that they don't fall victim to hacking activity.
In reply to Md Assaduzzaman

Re: Answer the question

by Momenunnessa Meem -
Definition: An example of hacktivism is a denial of service attack (DoS) which shuts down a system to prevent customer access. Other examples involve providing citizens with access to government-censored web pages or providing privacy-protected means of communication to threatened groups (such as Syrians during the Arab Spring).
Real-life Example of Hacktivism:
Distributed Denial of Service (DDoS) Attacks: Attacks which bring down websites or otherwise disrupt Internet activity by systematically sending so many requests to a server that it cannot handle the traffic and is rendered temporarily useless. Common examples include email bombing and web sit-ins.
Website Defacements: Attacks which change the content of websites, usually for the purpose of spreading a political message.
Internet Worms: Programs designed to spread themselves within a network, either for the purpose of disrupting activity or spreading a message.
In reply to Md Assaduzzaman

Re: Answer the question

by Al- mamun -
Hacktivism is defined as the intentional misuse of a computer system or network for a social or political purpose.

Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.
In reply to Md Assaduzzaman

Re: Answer the question

by Shahida Akter -
Hacktivism is the act of misusing a computer system or network for a socially or politically motivated reason. Individuals who perform hacktivism are known as hacktivists.

Real life Example of Hactivism:
Anonymous blogging. Activists, whistleblowers and journalists use this tactic. It protects the blogger, while providing a platform for them to speak out about an issue, such as human rights violations or oppressive government regimes.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
Leaking information. This is a popular activist tactic. Typically, an insider source will access sensitive or classified information -- which implicates an individual, organization or government agency in an activity that reflects negatively on them -- and make it public. WikiLeaks is known for publishing leaked data.
In reply to Md Assaduzzaman

Re: Answer the question

by Ramim Hossain -
Hacktivism's Examples
Given that hacktivism is a relatively new term, it's critical to identify some of the larger hacktivism occurrences and the causes for their occurrence. This can aid organizations in comprehending some of the motivations behind hacktivism and possibly analyzing techniques to prevent becoming victims of hacktivism.

Operation Tunisia
In 2011, the Ministry of Industry in Tunisia was attacked by the cyber group Anonymous. The cyber group even attacked the Tunisian stock exchange. The reason behind the attack was censorship and government attacks of anyone attempting to publish free speech through the website WikiLeaks. The attacks were retaliatory in nature and were comprised of several Distributed Denial of Service processes to knock government sites off-line. A DDoS attack is simply bombarding a legitimate website with so much data and request information it can no longer accept legitimate page requests. They also gained access to government websites and defaced them with letters outing the Tunisian government for oppression of speech and censorship.