
GUEST OPINION: Radware has issued a threat advisory highlighting both Pro-Russian and Pro-Palestinian hacktivist campaigns targeting 39 websites of Australian government institutions, and transportation, financial, legal, education and insurance entities.
Radware says in its threat advisory that in November, the groups conducted over 60 DDoS attacks.
Radware lists key attack insights as:
- Over 60 DDoS attacks were conducted by pro-Russian and pro-Palestinian hacktivist groups targeting 39 websites of Australian government institutions, transportation, organization, financial, legal, educational, and insurance entities.
- Pro-Russian group NoName057(16) claimed responsibility for more than half of the attacks, including over a dozen attacks on November 30, 2024, marking the peak of the campaign.
- The attacks were primarily triggered by Australia’s decision to provide 14 military boats worth over $9 million to Ukraine, aligning the country with Western support against Russia
- NoName057(16), Cyber Army of Russia Reborn, and Z-Pentest framed these actions as Australia’s escalation in the Ukraine conflict, directly challenging Russian strategic interests.
- RipperSec and allied groups targeted Australia due to its perceived support for Israel in the Israel-Palestine conflict, accusing the nation of complicity in Palestinian oppression.
- By aligning with groups like Fighter Blackhat and the Pro-Palestinian Hacker Movement (PPHM), RipperSec amplified the scale and visibility of its actions as part of a broader campaign.