What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience

Hacking is most often associated with the criminal behaviour of taking down websites or spreading malware for financial gain. However, some hackers are not in it just for the money. Due to the heightened sense of political awareness across society, some hackers have chosen to use their skills to take a stand by engaging in agenda-driven attacks.

What is hacktivism?

The term ‘hacktivism’ originated in the mid-90s, when it was first coined by Omega, a member of the retro hacking group Cult of the Dead Cow. However, it wasn’t until the 2010s that it truly gained notoriety. 

Although the execution of hacktivist attacks has evolved over the years, the term has more or less remained the same. It is usually defined as the use of computer-based techniques for some form of civil disobedience in order to promote a political agenda or social change.

In light of the range of motivations that drive hacktivists, there is also a wide range of tools and methods to carry out one's desires - the most common being a denial-of-service (DDoS) attack. These attacks are launched to take down a website by flooding it with fake traffic.

Elsewhere, hacktivists have previously relied on data theft to expose sensitive files or records belonging to a target publicly over the internet - a method typically deployed to expose targets with something to hide, such as large corporations or governments. Prominent targets have also included donors to political campaigns, or individuals alleged to have evading tax.

The history of hacktivism

Hacktivism has its roots in the early days of the internet when hackers primarily congregated on Usenet and message boards. Many of these early hackers were motivated by idealism, with a general tendency towards left-wing, anti-capitalist, anti-corporate viewpoints. This, combined with a sense of anarchic mischief and a love of messing with people and systems, spurred numerous hacks protesting various social and political issues.

Hackers deployed various forms of malware against targets to disrupt their operations, hindering progress by rendering computer systems and networks unusable. An early example was the hilariously named Worms Against Nuclear Killers (a rather explicit acronym!) malware, which was released into NASA's networks in 1989 to protest the launch of the nuclear-powered rocket carrying the Galileo probe into orbit. The attack reportedly cost the project half a million dollars in lost time and resources, according to officials.

Anonymous

Modern hacktivism, however, has been defined mainly by the group known as 'Anonymous'. First emerging in the early 2000's, 'Anonymous' was originally the collective name given to groups of users from the 4chan message boards, who would frequently band together to attack targets based on little more than an idle whim. These attacks ranged from relatively harmless pranks, such as ordering numerous pizzas to someone's house, to more vicious attacks such as carrying out DDOS strikes against websites or doxxing people.

What makes Anonymous unique is that it has no formal membership, controlling body or internal structure. Anyone can participate in its operations at will, and the targets and attack vectors it picks are determined by popular consensus amongst its members and fans. In its early days, Anonymous wasn't overly focused on political or ideological issues, preferring instead to target internet personalities that its members felt needed to be taken down a peg or two.

The group's first real foray into hacktivism came in 2008 when the group began a campaign of attacks against the church of Scientology. Operation Chanology, as it was known, included a week-long DDoS against the church's website, along with physical protests outside various Scientologist properties. The adoption by protestors of the Guy Fawkes mask from cult graphic novel V for Vendetta, incidentally, is what led to its now-iconic status as a symbol of hacktivism.

Following Project Chanology, Anonymous has also been heavily involved in various campaigns to foil attacks on internet freedoms. The group mounted significant efforts to fight the Stop Online Piracy Act (SOPA) and the Protect Intellectual Property Act (PIPA), both of which were accused of being efforts to censor the web. In more recent years, the group has been carrying out persistent attacks against the online arms of the terrorist group ISIS, targeting websites and social media accounts used to spread propaganda.

Hacktivism is often controversial. While many decry the use of objectively illegal cyber attacks, no matter how noble the cause, many applaud vigilante hackers like Anonymous and others for taking the law into their own hands.

Recent cases of hacktivism

Although hacktivism arguably no longer generates as much media attention as during Anonymous’ heyday, 2020 was not exempt from such incidents.

One notable example is from July, when hackers managed to breach the server of a major contractor working on behalf of the Russian intelligence service. They obtained 7.5TB of sensitive data and shared it freely with other hackers and journalists. Much of this included detailed information about sensitive government IT projects commissioned by the Federal Security Service of the Russian Federation (FSB).

Another notable incident involves Anonymous themselves. Following the death of George Floyd on 25 May, the organisation resurfaced to reportedly shut down the official website of the Minneapolis Police Department. When the site was finally restored, users were asked to complete a captcha in order to ensure they were not automated bots orchestrating a DDoS attack.

Featured Resources

Four cyber security essentials that your board of directors wants to know

The insights to help you deliver what they need

Download now

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company

Download now

Improving cyber security for remote working

13 recommendations for security from any location

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

Recommended

What are biometrics?
Security

What are biometrics?

27 Nov 2020
Black Friday's best antivirus deals
Security

Black Friday's best antivirus deals

27 Nov 2020
Veritas Access Appliance with IBM Spectrum® Protect
Server & storage

Veritas Access Appliance with IBM Spectrum® Protect

27 Nov 2020
Ransomware protection with Veritas NetBackup Appliances
Security

Ransomware protection with Veritas NetBackup Appliances

27 Nov 2020

Most Popular

80% of cyber professionals say the Computer Misuse Act is working against them
Security

80% of cyber professionals say the Computer Misuse Act is working against them

20 Nov 2020
Cisco acquires container security startup Banzai Cloud
Security

Cisco acquires container security startup Banzai Cloud

18 Nov 2020
46 million Animal Jam accounts leaked after comms software breach
Security

46 million Animal Jam accounts leaked after comms software breach

13 Nov 2020