Ghost Squad Hackers ("GSH") is a hacktivist group responsible for several cyber attacks. Former targets of the group include central banks, Fox News, CNN, the United States Armed Forces and the government of Israel. The group is led by a de facto leader known as s1ege (leet for "siege"), and selects targets primarily for political reasons. The group forms a part of the hacktivist group Anonymous.[1][2]

List of attacks on governments and organizations

edit

Defacements of the Ethiopian government

edit

In January 2016, GSH defaced Ethiopian government websites in response to the killing of nearly 500 students and activists by Ethiopian Security Forces during protests that became extremely violent was involved in the latter part of 2015 and then sparked again between August and October in 2016 Ethiopian protests.[3][4][5]

Attacks on Donald Trump

edit

On May 21, 2016 GSH targeted Donald Trump's official website by launching Distributed Denial of Service (DDoS) attacks for what they saw as racist comments made towards refugees and Mexicans.[6][7] Shortly after targeting Trump's official website GSH shut down Trump's hotel collection websites.[8][9][10]

Attacks on the Israeli Defense Force

edit

The group gained more notoriety after having successfully leaked data of the Israeli Defense Force on April 7, 2016. This was the day #OpIsrael was launched along with Anonymous, leaking the Database of Israel Defense Force posting thousands of IDF soldiers, border patrol, and Israeli Air Force personnel information online.[11][unreliable source]

Attacks on the Ku Klux Klan

edit

On April 23, 2016 GSH targeted the Loyal White Knights of the Ku Klux Klan by taking their websites down in the protest of racism while Anonymous vs. KKK protests were happening in the state of Georgia, U.S.A.[12][13][14][15][16][17][18][19]

Attacks on Black Lives Matter

edit

In 2016, GSH took down the official website of Black Lives Matter, claiming the organization fueled further racism.[20][21][22][23]

Attacks on Banks

edit

GSH and Anonymous worked in correlation together when "Operation Icarus" was first launched in February 2016.[24] The op was aimed at attacking the central banking system which the attackers accused the banks with corruption and wanted to raise public awareness. This attack sparked the invitation of more hacking teams and affiliations of Anonymous to focus their attention towards that of the Central Banks in direct regards of further scrutiny and cyber attacks.[25]

Ghost Squad Hacker's leader s1ege claimed responsibility for the attacks which were carried out on the Bank of England email server and dozens of other banking websites including the New York Stock Exchange, Bank of France, Bank of Greece, Bank of Jordan and the Bank of South Korea, among others. s1ege went on to state that they want to "start an online revolution" to retaliate against the "elite banking cartels putting the world in a perpetual state of chaos."[26][27][28] Hundreds of banks were targeted in this operation and to this day the exact number of banks affected is unknown.[29][30][31][32][33][34][35]

Attacks on CNN, Fox News

edit

Notoriety of the group continued to escalate as the heat was turned up during the month of June, 2016. After censoring of media coverage in regards to OpIsrael, OpSilence[36] was initiated targeting mainstream media outlets such as CNN and Fox News.[37][38][39][40][41]

Data leakage of the U.S Armed Forces/Military

edit

A data dump was later leaked after hacking the United States Military personnel files and releasing information on close to 2,437 army personnel.[42][43] The information contained in the link was uploaded to an onion link on the dark web along with a paste-bin link which contained credit card numbers and personal information on U.S. Army personnel.[44][45][46][47][48][49][50]

Defacement of Baton Rouge City government website

edit

July 19, 2016 the sub domain of Baton Rouge City government website[51] was hacked twice in one day by GSH after previously making news after attack towards both the KKK and BLM.[52] These attacks however were targeting the City of Baton Rouge, Louisiana in protest against police brutality in which a city native Alton Sterling was shot and killed by Baton Rouge police officers on the 5th earlier that month. The Baton Rouge website[53] was defaced along with a picture of Alton Sterling with a message that read, "Being black is not a crime! This is for the shooting of Alton Sterling, just because he's black does not mean he is a bad guy. You will pay. We are the justice. We are Ghost Squad Hackers. /R.I.P. Alton Sterling".[54]

Attacks on the Afghanistan government and its officials

edit

On July 31, 2016 GSH took over the official Twitter account of Afghanistan's Chief Executive Dr. Abdullah Abdullah in an effort to raise awareness against corruption and alleged drug deals between Afghanistan and the U.S. They also targeted the Afghan Public Credit Registry website[55] by defacing it which also further allowed them access to several social media accounts including Dr. Abdullah's in which they tweeted,

"Afghanistan Gov Hacked by GhostSquadHackers #CheifExecutiveOfficer Can you hear me now? twitter.com/afgexecutive. We found an exploit in the government server and pulled every login we could. We have more also but Dr. Abdullah was not using phone restriction and 2FA was not enabled".[56]

The attacks on the Afghan government continued relentlessly on the first of September after prior targeting of Afghanistan's Chief Executive Twitter account, GSH further assaulted the government by defacing twelve websites in one day all of which were affiliated with the Afghan government.[57] This included Afghanistan's Ministry of Justice, the Ministry of Defense, the Ministry of Foreign Affairs, the Ministry of Refugees and Repatriations, and the Afghan Attorney General's Office. Further assaults continued in hopes of raising awareness for Palestine as part of OpSilence[58] and OpIsrael after shutting down the Israeli Prime Minister and the Bank of Israel.[59]

Operation Decrypt ISIS

edit

The group's focus in 2017 shifted slightly towards targeting ISIS and removing them off the internet and social media completely. A multitude of accounts from Facebook, Twitter, and Telegram alike were hacked and added to an extensive list of ISIS removed. Further efforts by GSH later revealed bomb instructions and plans to be carried out by ISIS.[60][61]

s1ege stated "We really do not care about attacking the U.S. elections. They've already been hacked. We mostly hack ISIS" in an interview with CBS news in the year 2018.[62][63]

On February 12, 2019 s1ege released a massive leak on Islamic State Telegram and WhatsApp group's/channel's administrators. The leak included hacked phones/mobile devices, hacked Telegram accounts, hacked Facebook's, hacked Twitter accounts, credit cards, geolocation data, government issued ID cards, and IP logs belonging to the administrators. The group successfully infiltrated the Islamic state community on encrypted communication applications and exposed the administrators by using malware and exploits.[64][65][66][67] The leak was published on mega.nz and Ghost Squad Hackers Official Twitter account.[68][69][70][71] One of the Telegram and WhatsApp Admins (Riffat Mahmood Khan) was a former taxi driver living in Auburn was linked to ISIS and accused of administering the group's encrypted messages. He traveled to Syria in support of the Islamic State in 2015. He returned from the conflict zone via Turkey six months later, and was promptly picked up by Australian Federal Police officers at the airport as he flew in, in September 2015. Video footage from the raids obtained by The Herald showed his wife and the children being led away from the home by uniformed police, while officers swarm on the Auburn home. He is believed to not have actually participated in the fighting in Syria, but spent time there with the radical group before returning and allegedly continuing his work for the Caliphate. The man remained involved with the Islamic State's encrypted online messaging and continued to take care of the WhatsApp and Telegram groups that the radical Islamic group uses to communicate internally and for recruiting. Documents leaked by GSH showed that several of the accused ISIS supporter's children were enrolled in local Islamic school Al Bayan. He attended South Granville mosque Al Noor, where some sources suggest he became radicalized. Images from his hacked phone exposed by GSH depicted the ISIS flag flying above Venice, explosions, blood-stained knives, children brandishing ISIS flags, a meme saying 'One bullet away from Paradise' and critically wounded soldiers.[72][73][74][75] Leaked data from GSH showed one Belgian (Siraj El Moussaoui), known to be an ISIS supporter, had a video on his phone about how to most effectively behead someone. Siraj El Moussaoui tried in vain to join the Islamic State in 2016 and was arrested shortly after on suspicion of plotting an attack in Belgium.[76][77]

Defacements of the Indian Government

edit

Starting in April 2020 GSH conducted in a large number of mass defacements of government websites as well as root ownership of an Indian Government server and leaked data from the Australian government. This also included governments such as Australia, India and various others. The Twitter feed of GSH has shared a multitude of alleged attacks on various government websites during the pandemic using hashtags associated with previous campaigns of #FreeJulianAssange.[78][79][80][81]

In June the group claimed responsibility for the hacking of other Indian government websites in protest against the internet ban in Jammu and Kashmir.

GSH gave warning in a LiveWire interview saying “To the people of Jammu and Kashmir, we will support your efforts and continue to back you through this pandemic and tyrannical government's grip. If India's government is persistent, we will be more persistent and consistent. No region/state/ethnic group should not have access to the internet, not even limited access. These are basic civil rights and liberties.”[82][83][84][85]

Defacements of the European Space Agency (ESA)

edit

The group defaced the European Space Agency (ESA) website https://business.esa.int in July 2020. GSH claimed the attack was just for fun. They explained that they exploited a server-side request forgery (SSRF) remote code execution vulnerability in the server, then they gained access to the business.esa.int server and defaced it. Having no interest in leaking any data their intent was solely to show the server was vulnerable. Within a week of hacking the business domain of the ESA they defaced the https://space4rail.esa.int website as well.[86][87][88][89][90]

Defacements of Idaho State websites

edit

On July 27, 2020 GSH successfully targeted Idaho state websites servers locking agencies out of their own servers. Idaho Government websites targeted included the Idaho supreme court, Idaho court, Idaho Parks and Recreation, Idaho STEM Action Center, and were victims to the group. The sites were used to broadcast messages referencing Julian Assange, founder of WikiLeaks, who was charged with violating the Espionage Act. The messages read “Free Julian Assange! Journalism is not a crime.”[91][92][93][94][95][96]

Data leakage on various Sheriff/Police departments

edit

September 3, 2020 - GSH claimed responsibility for the breach of the Vermont Sheriff's Association, which resulted in a data leak of names, addresses, financial data and communications between/to various Vermont sheriffs. The leaked data was published in retaliation to the shootings of various individuals who fell victim to police brutality; including George Floyd, Jacob Blake, and Breonna Taylor.[97][98][99]

References

edit
  1. ^ "Interview with a hacker: S1ege from Ghost Squad Hackers". TechRepublic. Retrieved 2018-03-14.
  2. ^ "Interview of a Hacker: S1ege from Ghost Squad Hackers". Cyware. Retrieved 2018-09-01.
  3. ^ Shekhar, Amar (2016-01-07). "Ghost Squad Hackers Hack Ethiopian Websites In Response To Killing Of Protesting Students". Fossbytes. Retrieved 2018-03-14.
  4. ^ ahson (2016-01-09). "Deadly Protests in Ethiopia and Response Of Ghost Squad Hackers". The Hack Today. Retrieved 2019-02-23.
  5. ^ "Ghost Squad Hackers Hack Ethiopian Websites In Response To Killing Of Protesting Students". Information Security Newspaper. 2016-01-08. Retrieved 2019-02-23.
  6. ^ "Ghost Squad Hackers hit Trump sites with DDoS attacks". SC Media US. 2016-04-04. Retrieved 2018-03-14.
  7. ^ Qureshi, Noor (2016-03-19). "#OpTrump — Ghost Squad Hackers Targeted .edu Domains". The Hack Today. Retrieved 2019-02-23.
  8. ^ "Hacktivists Shut Down Donald Trump Hotel Collections Website". HackRead. 2016-05-21. Retrieved 2018-09-01.
  9. ^ "Donald Trump Hotel Collections Website Taken Down By The Ghost Squad". Latest Hacking News. 2016-05-22. Retrieved 2019-02-23.
  10. ^ "Ghost Squad Uses DDoS Attacks to Take Down Two Trump Websites". secureworldexpo.com. Archived from the original on 2019-02-24. Retrieved 2019-02-23.
  11. ^ "Ghost Squad Hackers Release Massive Data-Leak From The Israeli Defense Force". The Last American Vagabond. 2016-04-07. Retrieved 2018-03-14.
  12. ^ Waqas (2016-04-24). "Anonymous Ghost Squad's DDoS Attack Shuts Down KKK Website". HackRead. Retrieved 2018-03-14.
  13. ^ "Hackers attack KKK and briefly bring down main website". Fox News. 2016-04-24. Retrieved 2019-05-17.
  14. ^ "Anonymous Just Scored a Major Victory Against the KKK". Archived from the original on 2017-02-18. Retrieved 2018-09-01.
  15. ^ Crosbie, Jack (26 April 2016). "Anonymous Takes Down KKK Website". Inverse. Retrieved 2019-02-23.
  16. ^ Murgia, Madhumita (2016-04-25). "Hacker group Anonymous shuts down KKK website". The Telegraph. ISSN 0307-1235. Retrieved 2019-02-23.
  17. ^ techbug9 (2016-04-24). "KKK Website Shut Down by Anonymous Ghost Squad's DDoS Attack". TechWorm. Retrieved 2019-02-23.{{cite web}}: CS1 maint: numeric names: authors list (link)
  18. ^ "Anonymous affiliate Ghost Squad brings down KKK website". VPNPick.com. 2016-04-25. Retrieved 2019-02-23.
  19. ^ "Anonymous hacker group takes down KKK website | TheINQUIRER". theinquirer.net. 2016-04-25. Archived from the original on April 26, 2016. Retrieved 2019-02-23.{{cite web}}: CS1 maint: unfit URL (link)
  20. ^ Cimpanu, Catalin. "Anonymous Ghost Squad Hackers Take Down Black Lives Matter Website". softpedia. Retrieved 2018-03-14.
  21. ^ "Black Lives Matter website hit by more than 100 DDoS attacks in seven months". Archived from the original on 2018-09-02. Retrieved 2018-09-01.
  22. ^ "Anonymous Hackers Just Took On Their Next Target". Retrieved 2018-09-01.
  23. ^ Glaude, Eddie S. (2018-05-24). "James Baldwin and Black Lives Matter". A Political Companion to James Baldwin. University Press of Kentucky. doi:10.5810/kentucky/9780813169910.003.0014. ISBN 9780813169910.
  24. ^ Bond, Anthony (2016-05-04). "Anonymous announces war against Bank of England and New York Stock Exchange". mirror. Retrieved 2019-02-23.
  25. ^ Ashok, India (2016-05-13). "OpIcarus: Did Anonymous just hack the Bank of England?". International Business Times UK. Retrieved 2018-04-26.
  26. ^ "OpIcarus: Anonymous crusade against the sick banking industry". Security Affairs. 2016-05-15. Retrieved 2019-02-23.
  27. ^ "Anonymous Hits New York Stock Exchange, World Bank, The Fed, and Vatican — Total Media Blackout". activistpost.com. 2016-05-26. Retrieved 2019-02-23.
  28. ^ Syrmopoulos, Jay (2016-05-25). "Anonymous Hits New York Stock Exchange, World Bank, The Fed, & Vatican -- Total Media Blackout". The Free Thought Project. Retrieved 2019-02-23.
  29. ^ Mansfield, Katie (2016-05-11). "'This is just the beginning' Anonymous hackers take down nine banks in 30-day cyber attack". Express.co.uk. Retrieved 2019-02-23.
  30. ^ "Op Icarus: Anonymous hits 8 banks with DDoS attacks". International Business Times UK. 2016-05-09. Retrieved 2019-02-23.
  31. ^ "OpIcarus: Anonymous Shut Down 4 More Banking Websites". HackRead. 2016-05-13. Retrieved 2019-02-23.
  32. ^ Cimpanu, Catalin (8 May 2016). "Anonymous Attacks Eight More Banks Part of OpIcarus". softpedia. Retrieved 2019-02-23.
  33. ^ techbug9 (2016-05-12). "Anonymous takes down nine banks in 30-day cyber attack". TechWorm. Retrieved 2019-02-23.{{cite web}}: CS1 maint: numeric names: authors list (link)
  34. ^ "Anonymous Teams up With GhostSquad to Attack Major Banks". cyware.com. Retrieved 2019-02-23.
  35. ^ "Anonymous teams up with GhostSquad to attack major banks". BetaNews. 12 May 2016. Retrieved 2019-02-23.
  36. ^ "Ghost Squad Hackers Announce #OpSilence, Month-Long Attacks on Mainstream Media". June 2016.
  37. ^ "Expert Opinion on #OpSilence attack on CNN email servers". digitalforensicsmagazine.com. 12 June 2016. Retrieved 2018-03-14.
  38. ^ "Anonymous Is Preparing an All-Out Assault on the Mainstream Media". mic.com. 31 May 2016. Retrieved 2019-02-23.
  39. ^ vijay (2016-06-02). "Anonymous announce OpSilence against MSM, bring down CNN and FOX News servers". TechWorm. Retrieved 2019-02-23.
  40. ^ righteous (2016-06-03). "#OpSilence - Ghost Squad Hackers Target Fox News, CNN, NBC and MSN". AnonHQ. Retrieved 2019-02-23.
  41. ^ Savitha (2016-06-20). "Anonymous Declares War on Mainstream Media: Attacks Fox, CNN, NBC and More". The Bengalurean. Retrieved 2019-02-23.
  42. ^ Cimpanu, Catalin. "Ghost Squad Hackers Leak Data of US Military Personnel". softpedia. Retrieved 2018-03-14.
  43. ^ "Hackers Leak Military Data". Archived from the original on 2018-09-02. Retrieved 2018-09-01.
  44. ^ Waqas (2016-06-23). "Hackers Just Leaked Personal Data of US Military Officials and it's Legit". HackRead. Retrieved 2018-04-26.
  45. ^ "Hackers steal and leak US military personnel data - SiliconANGLE". SiliconANGLE. 2016-06-24. Retrieved 2018-09-01.
  46. ^ "Thousands of US Military Personnel Records Leaked on Dark Web by Ghost Squad Hackers - Remove Spyware & Malware with SpyHunter - EnigmaSoft Ltd". Remove Spyware & Malware with SpyHunter - EnigmaSoft Ltd. 2016-06-24. Retrieved 2018-09-02.
  47. ^ "Hackers Leak Military Data". secureworldexpo.com. Archived from the original on 2018-09-02. Retrieved 2019-02-23.
  48. ^ "U.S Military Credit card and Personal data leaked By Hackers". Meet Hackers | Know Hackers With Us. 2016-06-25. Archived from the original on 2019-02-24. Retrieved 2019-02-23.
  49. ^ "Hackers Just Leaked Personal Data of US Military Officials and it's Legit". databreaches.net. 24 June 2016. Retrieved 2019-02-23.
  50. ^ Khan, Zahir (2016-07-01). "Credit Cards, Personal Information And Us Military Emails Leaked". The Hack Today. Retrieved 2019-02-23.
  51. ^ "Baton Rouge, LA | Official Website". www.brla.gov.
  52. ^ Waqas (2016-07-19). "Baton Rouge City Website Hacked Against Alton Sterling's Death". HackRead. Retrieved 2018-03-20.
  53. ^ "Baton Rouge, LA | Official Website". www.brla.gov.
  54. ^ Waqas (2016-07-19). "Baton Rouge City Website Hacked Against Alton Sterling's Death". HackRead. Retrieved 2018-04-26.
  55. ^ "Public Credit Registry Department - da Afghanistan Bank - Central Bank of Afghanistan". Archived from the original on 2016-05-06. Retrieved 2018-03-16.
  56. ^ Waqas (2016-07-31). "Twitter Account of Afghan Chief Executive Dr. Abdullah Hacked". HackRead. Retrieved 2018-04-26.
  57. ^ Cimpanu, Catalin. "Ghost Squad Hackers Deface 12 Afghan Government Websites". softpedia. Retrieved 2018-03-14.
  58. ^ "Ghost Squad Hackers Announce #OpSilence, Month-Long Attacks on Mainstream Media". June 2016.
  59. ^ "Ghost Squad Shuts Down Israeli Prime Minister, Bank of Israel websites". 29 August 2016.
  60. ^ "BREAKING: Anonymous Hacks ISIS Accounts Finds Attacks Planned for US, Bomb-Making Plans". The Free Thought Project. 2017-12-12. Retrieved 2018-04-26.
  61. ^ "Anonymous Hacks ISIS Accounts Finds Attacks Planned for US, Bomb-Making Plans! - NY Evening". NY Evening. 2018-05-14. Retrieved 2018-09-01.
  62. ^ "These are the hackers targeting the midterm election". cbsnews.com. 10 October 2018. Retrieved 2019-02-23.
  63. ^ Patterson, Dan. "Campaign 2018: These hacking groups could target the 2018 midterm elections". CNET. Retrieved 2019-02-23.
  64. ^ Dunn, Brian (2019-02-12). "Ghost Squad Hackers Release Contents from Internal Operation Known as #OpDecryptISIS, Exposing +1GB of Compressed Data Related To ISIS Members, Recruiters & Sympathizers Online". Rogue Media Labs. Archived from the original on 2019-02-24. Retrieved 2019-02-23.
  65. ^ Guy, Van Vlierden (February 21, 2019). "Telefoon van Antwerpse IS'er gehackt: een 'sexy hobbit' die wilde gaan vechten in Syrië".
  66. ^ "IŞİD Telegram Ve Whatsapp Grupları Hacklendi; Çok Sayıda Numara Ve Fotoğraf Paylaşıldı". Asyanın Sesi (in Turkish). 2019-02-20. Archived from the original on 2024-07-11. Retrieved 2019-02-23.
  67. ^ "Vazamento de Dados – OpDecryptIsis – GhostSquadHackers". DefCon-Lab.org (in Brazilian Portuguese). 2019-02-13. Retrieved 2019-02-23.
  68. ^ "Isis admins on Telegram & Whatsapp have been decrypted #OpDecryptIsis We've managed to hack nearly most of the admin's: *Phones *Geolocation *Cameras *Telegram *Facebook *Twitter *IDs *Credit Cards *IP Logs leak".
  69. ^ "MEGA".
  70. ^ https://ghostbin.com/paste/ez8te pic.twitter.com/RiVnxFr6cC
  71. ^ twitter.com https://twitter.com/__s1ege/status/109853361015461068. {{cite web}}: Missing or empty |title= (help)
  72. ^ Rawsthorne, Sally (2019-02-28). "'One bullet away from Paradise': Alleged Islamic State admin living in Sydney". The Age. Retrieved 2019-03-06.
  73. ^ Rawsthorne, Sally (2019-02-28). "'One bullet away from Paradise': Alleged Islamic State admin living in Sydney". The Sydney Morning Herald. Retrieved 2019-03-06.
  74. ^ "Australia: "One bullet away from Paradise": Alleged ISIS admin discovered living in Sydney - PressFrom - Australia". PressFrom - AU. Retrieved 2019-03-06.
  75. ^ "Bangladeshi origin former taxi driver is ISIS 'admin' in Australia". bharattimes.com. 2019-03-02. Retrieved 2019-03-06.
  76. ^ ""One bullet away from Paradise": Alleged ISIS admin discovered living in Sydney". msn.com. Retrieved 2019-03-06.
  77. ^ Naeyaert, Jonas (2019-02-21). "Betrapt: 30 GSM's van jihadisten gehackt". SCEPTR (in Dutch). Archived from the original on 2019-03-06. Retrieved 2019-03-06.
  78. ^ "Could Return of Ghost Squad Hackers Signal Rise in COVID-19-Related Hactivism?". Dark Reading. 16 April 2020. Retrieved 2020-10-02.
  79. ^ "Could Return of Ghost Squad Hackers Signal Rise in COVID-19-Related Hactivism?". OODA Loop. 2020-04-17. Retrieved 2020-10-02.
  80. ^ "COVID-19 Update: Cyberthreat to Governments Around the World! | Blogs | Internet, IT & e-Discovery Blog | Foley & Lardner LLP". foley.com. Archived from the original on 2020-10-08. Retrieved 2020-10-02.
  81. ^ "COVID-19 Update: Cyberthreat to Governments Around the World!". The National Law Review. Retrieved 2020-10-02.
  82. ^ "Interview: Ghost Squad Hackers Say They're Targeting Govt Sites to Protest Kashmir Net Restrictions". Live Wire. 2020-06-03. Retrieved 2020-10-02.
  83. ^ "Group hacks Telangana govt website to protest Jammu & Kashmir curbs". The New Indian Express. 14 May 2020. Retrieved 2020-10-02.
  84. ^ "Indian Government Websites Hacked for Kashmir Internet | Censorship". Meet Hackers. 2020-04-20. Archived from the original on 2020-10-08. Retrieved 2020-10-02.
  85. ^ "ആരോഗ്യ വകുപ്പിന്റെ വെബ്‌സൈറ്റ് ഹാക്ക് ചെയ്തു". twentyfournews.com. 2020-03-08. Retrieved 2020-10-02.
  86. ^ "Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site". Security Affairs. 2020-07-15. Retrieved 2020-10-02.
  87. ^ "Exclusive, Ghost Squad Hackers defaced European Space Agency (ESA) site – CyberCureME". 15 July 2020. Retrieved 2020-10-02.
  88. ^ "Ghost Squad Hackers hacked European Space Agency site | Cybersafe News". 2020-07-15. Retrieved 2020-10-02.
  89. ^ "Ghost Squad Hackers defaced a second European Space Agency (ESA) site in a week". Security Affairs. 2020-07-19. Retrieved 2020-10-02.
  90. ^ "Ghost Squad Hackers did it again! European Space Agency (ESA) site got defaced twice in a week!". Nordic IT Security Hybrid Edition. 2020-07-23. Archived from the original on 2020-10-07. Retrieved 2020-10-02.
  91. ^ "Several state websites fall victim to hacking breach". ktvb.com. 27 July 2020. Retrieved 2020-10-02.
  92. ^ Morrin, Brian (2020-07-26). "State of Idaho server hacked by 'ghost squad'". KBOI. Retrieved 2020-10-02.
  93. ^ "Three Idaho State Websites Are Vandalized by Hackers". govtech.com. 27 July 2020. Retrieved 2020-10-02.
  94. ^ "'Free Julian Assange': Trio of Idaho state websites taken over by hackers".
  95. ^ Yedakula, Kalyan. "Hacktivists Go on to Add New Feathers to Their Caps With Each Passing Year | Cyware Hacker News". cyware-social-nuxt. Retrieved 2020-10-02.
  96. ^ "Three Idaho State Websites Are Vandalized by Hackers | | infoSEC.coffee". 2020-07-28. Retrieved 2020-10-02.
  97. ^ "Website of Vermont Sheriffs' Association breached". wcax.com. Associated Press. 3 September 2020. Retrieved 2020-10-02.
  98. ^ "Website of Vermont Sheriffs' Association breached". The Washington Times. Retrieved 2020-10-02.
  99. ^ "Website of Vermont Sheriffs' Association Breached". U.S. News. September 3, 2020.