Conference PaperPDF Available

Hacktivism and Website Defacement: Motivations, Capabilities and Potential Threats

Authors:
  • The Hague University of Applied Sciences / Radboud University

Abstract and Figures

Hacktivism and website defacement seem often to be linked: websites are defaced by hacktivists on a daily basis for many different reasons. However, due to a lack of studies of this phenomenon, it remains unclear as to what, exactly, their socio-psychological motivations are, what their modus operandi is, and whether the combination of these factors poses a serious threat to corporations and governmental organizations. In order to answer these questions, this paper provides a qualitative analysis of the motives and intentions of hacktivists, and a qualitative analysis of their modus operandi. It seems that hacktivists who deface websites have multiple ideological and psychological motivations for their actions. Although the socio-political motivations appear to be the most important, other triggers-such as thrill seeking and increasing self-esteem-also play a relevant part. The investigation into the modus operandi has revealed that hacktivists often use known and relatively unsophisticated vulnerabilities and techniques. In addition, they use publicly available tools, but are also able to create their own. Targets seem to be chosen based either on how easy they are to hack and/or on the potential amount of attention the defacement is likely to receive. The methodology of this research involves an extensive review of the existing literature on the topic, corroborated by several interviews with hacktivists and experts in the fi eld of information and cybersecurity. The researchers conducted an analysis of forensic data gained from a honeypot server created ad hoc for this research, and examined technical data from over 7 million defacements based on the dataset of the Zone-H Defacement Archive.
Content may be subject to copyright.
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
1VIRUS BULLETIN CONFERENCE OCTOBER 2017
HACKTIVISM AND WEBSITE
DEFACEMENT: MOTIVATIONS,
CAPABILITIES AND POTENTIAL
THREATS
Marco Romagna & Niek Jan van den Hout
The Hague University of Applied Sciences,
The Netherlands
Email {m.romagna, n.j.vandenhout}@hhs.nl
ABSTRACT
Hacktivism and website defacement seem often to be linked:
websites are defaced by hacktivists on a daily basis for many
different reasons. However, due to a lack of studies of this
phenomenon, it remains unclear as to what, exactly, their
socio-psychological motivations are, what their modus
operandi is, and whether the combination of these factors
poses a serious threat to corporations and governmental
organizations.
In order to answer these questions, this paper provides a
qualitative analysis of the motives and intentions of
hacktivists, and a qualitative analysis of their modus operandi.
It seems that hacktivists who deface websites have multiple
ideological and psychological motivations for their actions.
Although the socio-political motivations appear to be the most
important, other triggers – such as thrill seeking and increasing
self-esteem – also play a relevant part. The investigation into
the modus operandi has revealed that hacktivists often use
known and relatively unsophisticated vulnerabilities and
techniques. In addition, they use publicly available tools, but
are also able to create their own. Targets seem to be chosen
based either on how easy they are to hack and/or on the
potential amount of attention the defacement is likely to
receive. The methodology of this research involves an
extensive review of the existing literature on the topic,
corroborated by several interviews with hacktivists and experts
in the fi eld of information and cybersecurity. The researchers
conducted an analysis of forensic data gained from a honeypot
server created ad hoc for this research, and examined technical
data from over 7 million defacements based on the dataset of
the Zone-H Defacement Archive.
INTRODUCTION
In March 2017, between Sunday 11 March and Monday 12
March, many Dutch websites were allegedly targeted by
Turkish hacktivists following a political spat between the
Netherlands and Turkey [1]. The trigger for the attacks was the
refusal of the Dutch government to allow Turkish offi cials to
enter the Netherlands in order to rally expat voters for the
upcoming Turkish constitutional referendum (Fox-IT1 [2]). The
campaign became known as the ‘Netherlands Operation’.
Dutch domains were not the only targets of the attackers, who
mainly employed DDoS, website defacements and social
network account defacements as forms of disruption.
1 Fox-IT is a Dutch company, part of NCC Group, that works in the
elds of cybersecurity and risk mitigation, and helps businesses to
protect their brand, value and reputation against the ever-evolving
threat landscape.
According to CNBC journalist Arjun Kharpa [3], hundreds of
Twitter accounts, from those of media outlets to those
belonging to celebrities, were hacked and branded with the
Turkish fl ag and messages in Turkish. In its analysis of the
attack, Fox-IT [2] noted that many of the methods and
techniques used were relatively simple and could have been
executed by any person with basic hacking knowledge and
skills.
This episode might lend credence to two hypotheses: 1) the
cybersecurity of many websites is still low, considering the
fact that the methods used for defacement are usually quite
simple. 2) Website defacement still plays a relevant role
among hacktivists, and is one of their favourite tools for
promoting ideological and socio-political goals. As Samuel [4]
noted, a ‘site defacement consists of hacking into a web server
and replacing a web page with a new page bearing [… a
socio2]-political message’. At the time Samuel wrote this, in
2004, there were probably several defacements that targeted
specifi c organizations, as hacktivists wanted to make a
statement, to criticize those precise organizations (normally
corporations or governments) [4].
An early example is an attack against the US Department of
Justice web server that dates back to 1996. In the fi rst known
defacement launched by hacktivists, the protests were directed
against the Communications Decency Act (CDA) with its
provisions for screening offensive material online [5].
Hacktivists reacted in a very provocative way, displaying on
the homepage of the Department the words ‘Department of
Injustice’ and showing pornographic images.
Nowadays, we witness a different tendency: during the
‘Netherlands Operation’, conducted by Turk Hack Team and
by other groups, hacktivists did not limit their defacements to
specifi c websites that could have been connected in some way
with the Dutch-Turkish tensions (such as law enforcement
agencies or government websites), but randomly chose web
pages that were completely unrelated to the political issue (as
long as they were registered as Dutch domains). The situation
was different for the DDoS attacks, where hacktivists hindered
the websites of the Dutch police, some political parties (VVD,
PVV) and media outlets (NOS and The Telegraph) [2]. This
trend seems to be confi rmed in the analysis of the data
provided by the Zone-H Defacement Archive3, and in the
words of some of our interviewees.
Hacktivists now seem more likely to deface any websites with
poor security measures (no matter the topic of the site) in
order to spread a message. It therefore appears that the target
per se is no longer so important, while the visibility
(calculated on the number of defaced websites) represents the
main element. In a way, this becomes even more true when the
defacements are part of larger attacks that fall under the
concept of cyberwar between different countries [4]. An
example is provided by the geo-political Indo-Pakistani
tensions: hacktivists, or so-called state-sponsored hacktivists,
tend to deface any websites with poor security measures
regardless of the content, as long as the domain is Indian (for
Pakistani hacktivists) or Pakistani (for Indian hacktivists). In
2 Words in brackets are ours.
3 Zone-H Defacement Archive (hereafter Zone-H Archive) is a freely
available database that has recorded website defacements since 2001.
The database is open for general consultation at the URL
http://www.zone-h.org/. For specifi c data, the company that manages
the database levies a service charge.
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
2VIRUS BULLETIN CONFERENCE OCTOBER 2017
more spectacular operations, hacktivists attempt to target
government websites, aiming both to make a direct statement
against a government on its web page, and to shame it by
exposing its inability to keep its websites safe.
This paper will attempt to clarify what connections exist
between website defacement and hacktivism, answering the
following questions:
What is the link between hacktivism and website
defacement?
What are the motivations and the modus operandi of
hacktivists that engage in website defacement?
To what extent does website defacement represent a
threat when linked to hacktivism?
The paper is structured in fi ve main parts: fi rst we will explain
what we mean by the terms ‘hacktivism’ and ‘website
defacement’, and how the two are connected. Then we will
describe, step by step, the methodology that has been used to
retrieve data and conduct the investigation. In the third part,
we will provide insights into the motivations that push
hackers in general and hacktivists in particular to engage in
website defacements. In the fourth section we analyse the
modus operandi and the tools used, and fi nally we draw some
conclusions.
CONCEPTUALIZING HACKTIVISM AND
WEBSITE DEFACEMENT
Hacktivism is a complicated phenomenon and it can be
interpreted in different ways [6]. In this paper we borrow part
of the defi nitions provided by Milan ([6], p.550) and Denning
([7], p.241) and we describe it as the sum of ideologies,
individual and collective actions typical of traditional
activism, applied in cyberspace through the use of hacking
techniques, while addressing or exploiting network
infrastructure’s technical and ontological features, with the
nal goal of reaching a socio-political change in society.
Looking at the general history of hacktivism, we follow the
path of previous studies and research that mainly identify it as
the sum of group/team operations rather than of single
individuals’ actions [4, 6, 8]. This point is in line with the
traditional organizational structure of activism and it clarifi es
why, in our defi nition, we apply the concept of collective
action given by Melucci ([9], p.43), who describes it as ‘the
result of purposes, resources, and limits, as a purposive
orientation constructed by means of social relationships
within a system of opportunities and constraints’. The role
played by the group has an undeniably important part in
deciding the socio-political approach, the ideological beliefs,
the operational lines and the targets, but as Milan [10] points
out, the individual in hacktivism still has a fundamental
function because the ‘we’ essentially is the sum of the various
self-contained ‘I’s ([10], p.89). The person is still independent
in the group, likely as consequence of the fact that the
technical component (coding and hacking) is primarily based
on individual skills, and the tasks within the group are
assigned mainly considering the technical expertise of each
member ([6], p.556). This is a tendency that also seems to
exist among defacements performed in the name of
hacktivism; our interviewees confi rmed that the operations
per se are likely the result of team work, but that every
member has a specifi c role, a tailored task and a certain
number of domains to target.
The defi nition of website defacement is less debatable than
that of hacktivism, nevertheless there is still some uncertainty,
prompting us to provide our view: for website defacement we
mean the act of disfi guring without authorization a location
on the Internet. On the one hand, we embrace the defi nition
given by Samuel ([4]:8) as an attack on a website that
changes the visual appearance of the whole site or of one or
more web pages; on the other hand, since we deliberately use
the word location in our defi nition, we enlarge the concept
not only to the disfi gurement of a traditional HTML page, but
also to unauthorized changes on social network accounts such
as Facebook or Twitter (as happened during the ‘Netherlands
Operation’). We do understand that the techniques used differ
broadly and that website defacements are more interesting
from a technical perspective. We also had to take into account
the fact that our interviewees and Zone-H Archive do not deal
with attacks on social networks. For these reasons, our
analysis will focus only on HTML defacements, but we think
that it would be useful to widen the scope of the defi nition for
future research activities.
METHODOLOGY
The scientifi c literature on website defacements is scarcer
than we had expected when we started to draft this paper, and
the availability of literature dealing with defacements and
hacktivism is even poorer. Therefore we investigated the
topic, looking for previous works on hackers in general, on
hacktivism in particular, and on how website defacements are
conducted and what consequences they bring. We combined
the literature with some interviews and an analysis of the
Zone-H Archive. The research produced the results we will
present in this paper and gave us enough room to formulate
explorative questions and possible answers. The fi ndings
presented in this paper are based on qualitative and
quantitative analysis.
For the qualitative part, we tried to get in contact with
hacktivists that had been particularly active in defacing
websites during the last year (January – December 2016). In
order to fi nd out who the groups or single hacktivists were,
we checked the Zone-H Archive. Zone-H provides a database
that has been recording website defacements since 2001,
registering for every attack some specifi c characteristics:
targeted domain; attack date; attack time; attacker’s
nickname; operating system of the attacked website; web
server of the attacked website; attack methodology; attack
typology; new attack/re-defacement; intrusion level
(homepage/subdir); status (verifi ed/to be verifi ed); single/
mass defacement; fl ag. The person who fi lls in the form is
also required to indicate the motivation that triggered the
defacement. Considering that our main topic for this research
is hacktivism, we decided to examine only the attacks
conducted for ‘political reasons’ and for ‘patriotism’ between
January 2016 and December 2016. We then fi ltered the
database selecting these two motivations and checked which
were the 25 most active groups or individuals. Next, we
looked for possible contacts in order to communicate with
them. We examined the mirror pages that had automatically
been saved by Zone-H, as we had noticed that many
hacktivists leave their signatures or even contacts such as
emails, websites or social network accounts on the defaced
pages. This turned out to be a good source of information. We
noticed that the individuals with a Twitter account were the
most interested in starting a discussion with us. As often
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
3VIRUS BULLETIN CONFERENCE OCTOBER 2017
happens with people who engage in illegal activities (website
defacement violates several laws in different countries), only
ve out of the 25 individuals we tried to contact agreed to
answer our questions. For the interviews we used two
methods:
- Structured interviews conducted using a close
questionnaire consisting of 15 questions that addressed
hacktivism in general and website defacement in
particular; the questionnaire was sent to those groups or
individuals that only provided an email address as a form
of contact.
- Semi-structured interviews for those that were reachable
with synchronous tools (chat, instant messenger in
Twitter, Facebook, ICQ); this form of communication
seems better adapted to these conversations and gave us
more opportunities to direct the discussion and the
focus towards interesting topics or information that
came up during the talk. Moreover, it gave us time to
read the answers and ask for another chat with new
questions based on the answers from the previous
discussion.
The quantitative analysis was conducted focusing on the data
of Zone-H Archive for the period January 2016 – December
2016, but to have a clear overview of defacements in general
we will provide some data that dates back to January 2010. To
our knowledge, Zone-H Archive is the only available database
that has been recording website defacements. From 2010 to
2016 there were more than 7 million recorded attacks. We
noticed that the motivations provided by the individuals are
not always reliable (this has been confi rmed by the company
that manages the archive), but with the right corrections, we
tried to provide a good insight both into this particular
technique and into how it is linked to hacktivism. It is not
possible to state whether a defacer has actually been
motivated to act for political reasons or patriotism, but
skimming through dozens of mirror sites, we have noticed
that the motivation usually corresponds to that provided in
Zone-H Archive.
MOTIVATIONS AND INTENTIONS
In order to better understand hacktivism and the potential
threat it represents, this section offers an overview of the most
Figure 1: Total number of website defacements and division by single category in the period 2010-2016.
(Source: Zone-H Archive.)
2010 2011 2012 2013 2014 2015 2016
Total number of
defacements 1,418,687 1,608,893 1,192,291 1,391,457 1,150,449 1,010,478 888,064
Heh…just for fun 829,429
(58.46%)
818,863
(50.9%)
548,566
(46.01%)
674,983
(48.51%)
681,781
(59.26%)
630,107
(62.36%)
538,187
(60.60%)
I just want to be the best
defacer
289,637
(20.42%)
330,184
(20.52%)
228,369
(19.15%)
269,798
(19.39%)
224,465
(19.51%)
152,921
(15.13%)
141,580
(15.94%)
Not available 94,028
(6.63%)
97,541
(6.06%)
111,483
(9.35%)
232,145
(16.68%)
84,954
(7.38%)
70,045
(6.93%)
58,805
(6.62%)
Patriotism 59,009
(4.16%)
123,651
(7.69%)
54,936
(4.61%)
30,396
(2.18%)
21,742
(1.89%)
24,880
(2.46%)
39,532
(4.45%)
Political reasons 57,081
(4.02%)
92,685
(5.76%)
93,239
(7.82%)
67,276
(4.83%)
59,917
(5.21%)
61,383
(6.07%)
52,492
(5.91%)
Revenge against that
website
45,049
(3.18%)
73,764
(4.58%)
80,924
(6.79%)
59,125
(4.25%)
40,608
(3.53%)
36,091
(3.57%)
27,532
(3.1%)
As a challenge 44,454
(3.13%)
72,205
(4.49%)
74,774
(6.27%)
57,734
(4.15%)
36,982
(3.21%)
35,051
(3.47%)
29,936
(3.37%)
Table 1: Total number of website defacements (and percentages), and their division by single category in the period 2010-2016.
(Source: Zone-H Archive.)
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
4VIRUS BULLETIN CONFERENCE OCTOBER 2017
common motivations stated by hacktivists when defacing a
website. Although hacktivists are by defi nition driven
primarily by achieving socio-political change [4, 6, 8], their
behaviours and reasons for engaging in hacking cannot
completely be explained just by these kinds of motivations.
Many of the websites they deface do not have any
connections with the socio-political change they seem to be
seeking [11] and, as suggested by Denning [7], there are more
effective ways to reach it. According to Samuel [4],
hacktivists often choose a political agenda after they have
already decided to become politically active. These factors
suggest that there have to be other, secondary circumstances
that drive hacktivists to deface websites. Considering the
existing literature, motivations can roughly be divided into
two categories, namely socio-political and personal.
As shown in Figure 1 and Table 1, website defacements
registered a general decrease in the period 2010-2016: the
peak was reached in 2011 (1,608,893), while the total number
dropped to 888,064 (almost half) in 2016. Zone-H Archive
allows attackers to explain (in broad categories) why they
conducted the defacements. ‘Fun’ has been by far the most
common reason, followed at a considerable distance by the
goal of being the ‘best defacer’. Defacing websites for fun
decreased by almost 300,000 attacks, but it is relevant to note
that since 2012 its percentage of the total annual number of
attacks has continued to grow. We do not know who really is
behind these defacements, but based on general knowledge,
such a motivation seems more in line with the behaviour of a
script kiddie than with that of a grown-up hacker.
Nevertheless, we have to be careful in drawing fast
conclusions, as ‘fun’ can have different meanings in relation
to the person who has fun: it might be that a script kiddie
defaces for fun because he/she feels a thrill, but it might also
be that a skilled hacker fi nds it ‘fun’ (meant in this case as
challenging) to deface websites, providing a different
interpretation of the concept.
The signifi cant decline in defacements can have at least three
different explanations: the fi rst may be practical, since defacers
might not be interested in reporting their actions to Zone-H
anymore. Nevertheless, we believe this to be the least plausible
option, as generally speaking the people involved in these kinds
of activities seem to like or even seek a certain level of
attention [12], and therefore reporting the attack to Zone-H
would be one of the best chances for them to gain visibility.
The second explanation is linked to cybersecurity: it might be
that many websites have signifi cantly improved the security of
their web pages and therefore the hack requires more effort and
time compared to some years ago (this explanation seems more
acceptable, but as the ‘Netherlands Operation’ proved, many
vulnerabilities remain unpatched and can easily be exploited
[2]. Finally, hackers may fi nd website defacements less
interesting than in the past and prefer to spend energy and
resources on more sophisticated and technically advanced
operations, that would likely also give higher rewards (for
instance more information on the target, more
acknowledgement in the hacking scene, and so on).
Table 2 and Figure 2 focus on the connections between
defacements and hacktivism and its socio-political sphere; the
trend observed in the options analysed (political reasons and
patriotism) has remained quite stable in the last six years:
patriotism covers 4.45% (steadily growing since 2013), while
2010 2011 2012 2013 2014 2015 2016 Total 2010-2016
Total 1,418,687 1,608,902 1,192,300 1,391,467 1,150,453 1,010,478 888,064 8,660,351
Patriotism 59,009
(4.16%)
123,651
(7.69%)
54,936
(4.61%)
30,396
(2.18%)
21,742
(1.89%)
24,880
(2.46%)
39,532
(4.45%)
354,146
(4.08%)
Political 57,081
(4.02%)
92,685
(5.76%)
93,239
(7.82%)
67,276
(4.83%)
59,917
(5.21%)
61,383
(6.07%)
52,492
(5.91%)
484,073
(5.59%)
Political &
patriotism
total
116,090
(8.18%)
216,336
(13.45%)
148,175
(12.43%)
97,672
(7.03%)
81,659
(7.10%)
86,263
(8.54%)
92,024
(10.36%)
838,219
(9.67%)
Table 2: Number of website defacements conducted for ‘patriotism’ and ‘political reasons’ divided by year and in total, in the
period 2010-2016. (Source: Zone-H Archive.)
Figure 2: Number of website defacements conducted for ‘patriotism’ and ‘political reasons’ divided by year and in total, in
the period 2010-2016. (Source: Zone-H Archive.)
*
*These values have been corrected after the publication of the paper, but they
did not affect the final results. In fact the mistake was only present in the sum
shown in Table 2, while the data analysis and the other tables were done with
the correct data.
*
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
5VIRUS BULLETIN CONFERENCE OCTOBER 2017
defacements conducted for political reason reach an overall
percentage of 4.98.
We do not know if there is a connection, but during what
looked like the peak of Anonymous’ operations in 2011-2012,
Zone-H registered the highest number of attacks (especially
for political reasons). This does not mean that Anonymous’
members were more active in defacing websites, but it might
suggest that the general atmosphere of that period could have
encouraged other hackers to engage in these activities.
Figure 3 shows instead the general overview when comparing
the complete set of data on website defacements to those
carried out for reasons linked to hacktivism. As we noted
above, the trend of defacements conducted for patriotism and
political reasons is in countertendency compared to the
general leaning that registers a net reduction.
Socio-political motivations
As shown in Figure 1, socio-political motivations represent
the main trigger for hacktivists, but it should be noted that
they embrace many issues. From the mid-1990s hacktivists
have defaced websites to promote goals or draw attention to a
wide variety of issues [4]; these are in line with the typical
values held by the traditional activist movements that have
appeared on the international scene since the late 1970s and
that have been identifi ed with the ‘New social movements’, as
theorized by Melucci [9]. To name a few, they have engaged
in: anti- or alternative globalization protests against
corporations, protests in support of human rights and of the
environment, actions to criticize domestic or international
politics of a certain state [4, 13], anti-war statements, and
even revenge. The scope of their operations is clearly broad.
Examples of the last two can be found during the Kosovo
confl ict in 1998-1999: many hacktivists engaged in DDoS
attacks, defacements and website hijacking to protest against
the war and the countries involved in it. Chinese hacktivists
specifi cally targeted several American government websites
to show their disapproval and condemnation after the US Air
Force had erroneously bombed their embassy in Belgrade [5].
Patriotism
While the political sphere has quite a broad spectrum, the
defacements conducted for patriotism are more specifi c and
seem mainly to be related to regional or international
confl icts. As noted by Samuel [4], international geo-political
tensions and confl icts can easily develop into attacks within
cyberspace. Some authors tend to speak in this case of
cyberwar [7], but we feel more confi dent in using the terms
‘cyber skirmish’ or ‘cyber guerrilla’. The Kosovo confl ict is
again a good example of how patriotism is connected to
defacements. Indeed during the fi ght, two factions confronted
each other: many hacktivists/hackers defaced websites,
leaving messages that praise a ‘Free Kosovo’; at the same
time, nationalistic Serbian hacktivists/hackers like Serb Black
Hand engaged in heavier forms of cyber attacks, even
targeting NATO’s computer networks [7].
Another relevant example is provided by the continuing
geo-political tensions between India and Pakistan: both
Samuel [4] and Kovacs [14] have examined the skirmishes
among Indian and Pakistani hacktivists related to the ongoing
Kashmir confl ict [4, 14]. A analysis of the Zone-H Archive
data has shown that the two factions, which apparently
involve dozens of hacktivists, have engaged in the
defacements of opposite domains: Pakistani hacktivists deface
Indian websites and Indian hacktivists attack Pakistani web
pages. The history of hacktivism is full of similar examples
[15]: recently we have witnessed an escalation in defacements
that support the Islamic State of Iraq and Syria (ISIS) [16]
and others focused on the Israeli-Palestinian confl ict [13, 17,
18]. In one interview with a member of Tunisian Fallaga
Team (one of the most active hacktivists groups based on
Zone-H’s data), we asked how he would defi ne his hacking
activity and if it could be described as hacktivism. He replied
saying that he ‘loves’ calling it hacktivism and that his
message is always about a free Palestine and about all the
innocent people killed around the world, with particular focus
on Muslims [19].
Denning ([7], p.272) shows that patriotism can also be
motivated by causes that do not relate directly to international
confl ict, but are instead connected to internal struggles. An
example is the defacement of 40 Indonesian websites in
September 1998 which displayed the slogan ‘Free East
Timor’ in large black letters and contained links to other
websites describing Indonesian human rights abuses in the
former Portuguese colony.
Figure 3: Comparison among total defacements (grey area right axis) and defacements conducted for political reasons/patriotism
(left axis), in the period 2010-2016. (Source: Zone-H Archive.)
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
6VIRUS BULLETIN CONFERENCE OCTOBER 2017
As shown in Table 1, 869,874 websites were defaced for
reasons of patriotism between 2010 and 2016. Considering
that this motivation is more specifi c than the general socio-
political one, it is possible to conclude that patriotism is the
primary cause of website defacements among hacktivists.
When speaking of patriotic hacktivism, it is always necessary
to be careful and to distinguish it from state-sponsored
hacktivism: in the latter case, hacktivists are encouraged or
even supported by a state to engage in cyberattacks or cyber
protests, while in the former the motivations belong only to
the hacktivists. The problem with state-sponsored hacktivism
is that it is impossible to distinguish from traditional patriotic
hacktivism.
Hacker ideology
Other issues that seem to motivate hacktivists when defacing
websites are those related to typical hacker values and
ideologies. Levy [20] provides a great insight into these
principles, tracing them back to what he calls ‘The Hacker
Ethic’. According to Levy there are fi ve main principles that a
hacker should pursue:
Promote the freedom of information
Mistrust the authority and promote decentralization
Judge a hacker by his/her hacking skills and not by
criteria such as degrees, age, race, or position
Create (if possible) art and beauty on a computer
Use computers to improve the quality of life.
The fi rst two points in particular have often played an
important role in hacktivists’ ideology, as is also supported by
the research conducted by Coleman [21] into the well-known
hacktivist group Anonymous. An example of this typology is
the defacement of almost 500 Chinese websites carried out by
Anonymous [22] in reaction to censorship by the Chinese
government. On the defaced pages they wrote ‘Chinese
People, your government controls the Internet in your country
and strives to fi lter what it considers a threat for it. Be careful.
Use VPN for your own security. Or Tor.’
Psychological/personal motivations
To better understand the behaviour of hacktivists and their
personal/psychological motivations it is important to realize
that the majority of them choose to engage in hacktivism after
they have already decided to become hackers [4], usually
having the typical background and principles of the hacking
subculture [8]. Nevertheless, there are also some opposite
examples, as explained by Olson [23] and by one of our
interviewees: in these cases the personal motivations come
rst, and later on the individual engages in a (usually)
self-taught process to acquire hacking skills. While some
hacktivists affi rmed that they discovered the hacking world
through forums and through a trial-and-error process, a more
experienced hacktivist has clearly stated that he usually
teaches hacking techniques to the new members of his
team [24].
Hackers
When diving into the world of hacking it becomes clear that
the intellectual challenge of tinkering with computers lies at
its core. Linus Torvalds, a well-known hacker and inventor of
the Linux operating system, clarifi es that for hackers the
‘computer itself is entertainment’ [25]. Levy [20] defi nes a
hack as an act that demonstrates ‘innovation, style and
technical virtuosity’, and describes hackers as ‘adventurers,
visionaries, risk-takers, artists’. Research on the motivations
for engaging in hacking was conducted by Jordan and Taylor
[26], who found out that hackers are encouraged by several
different drivers: compulsion to hack, curiosity, attraction to
power, peer recognition, and the feeling of belonging to a
group. They basically confi rmed a previous study conducted
by Chantler [27] who constructed a list of 13 common
characteristics after studying hackers for over six years. He
concluded that hackers:
• Are loners
Have poor social skills
Have low self-esteem
Are intelligent, able to focus for extended periods
• Are young
Are explorers, investigators, curious, analytical
Have a strong desire to succeed
Are obsessive, even addicted to computers
Have poor communication skills
Have lots of acquaintances which they never meet
Enjoy a hierarchy amongst peers
Exchange knowledge and information amongst
themselves
Respect each other, are popular with peers, subordinates
and superiors
Are secretly admired by the public.
Not all of these characteristics must necessarily be met in
every hacktivist, but certainly some of them are clearly part of
their personalities. For instance, the core group of hacktivists
who were behind Anonymous and LulzSec [21, 23, 28] refl ect
many (but not all) of the features described by Chantler [27]:
some of them were loners with poor social skills, young and
generally intelligent, addicted to computers and eager to
increase their knowledge in different fi elds [23]. Barber [11]
argues that hacktivists ‘see the [I]nternet as their channel to
reach as many viewers as possible with their message.’ We
should not forget, as Denning [7] pointed out, that many
hacks are carried out for the thrill or simply because ‘it was
possible’. This was the case, for instance, with the Milw0rm
group that attacked the website of India’s Bhabha Atomic
Research Center (BARC) in 1998, to promote an anti-nuclear
and peaceful agenda, but also because it was purely thrilling
[7]. This was confi rmed by one of the hacktivists we
interviewed who hacks for political motivation, but also
enjoys the feeling given by the action itself [24].
Hacker Taggers
Hackers who engage in website defacements have some
specifi c characteristics that make them slightly different from
the others. In a study conducted by Woo, Kim and Dominick
[29], 462 defaced websites were analysed. The research
confi rmed that hackers may have different motivations for
engaging in defacements, the most common being
psychological and political. Woo et al. indicate that hackers
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
7VIRUS BULLETIN CONFERENCE OCTOBER 2017
often leave taunts, greetings or calling cards behind. They
also suggest that the websites disfi gured by hacktivists
contain more aggressive expressions than those defaced by
people who have fun or self-aggrandizement as primary
motivation. Besides, this they also argue that some hackers
deface websites for the sense of personal achievement, in line
with some of the characteristics described by Chantler [27].
From our analysis we can confi rm these tendencies and add
that hacktivists tend to post longer messages in which they
explain the reason for the defacement.
Warren and Leitch [12] investigated a group they called
‘Hacker Taggers’, and argue that these hackers deface
websites with the sole intent of leaving a ‘tag’ behind. After
examining data from the Zone-H Archive and analysing a
number of case studies, the two researchers suggested an
initial profi le for this sub-group. They confi rmed some of the
characteristics identifi ed by Chantler [27], such as the strong
desire to succeed and the importance given to the exchange of
information with each other. The two researchers depicted
four other main elements: high competitiveness; the desire to
cause minimal damage or no damage at all to the targeted
websites; the reliance upon media reports to cause political
damage or embarrassment; and fi nally the action as an
individual or in a team.
This profi ling suggests that succeeding and establishing a
reputation as a hacker play an important role in the motivation
of those who deface websites. Samuel describes website
defacement as ‘a way of demonstrating technical prowess and
establishing a reputation as a hacker’ [4]. Because the
techniques used do not require particularly advanced hacking
skills, it might be that website defacements are used as fi rst
step towards more complicated operations by those hackers
who have just entered the fi eld.
Hacktivists
In a very recent study, Madarie [30] attempted to quantify the
motivations of hackers in general, using Swartz’s theory of
motivational types of values. She found out that intellectual
challenge and curiosity were the most important motivators
for hacking into systems. She also tried to confi rm the
hypothesis that hacktivists place high value on self-
transcendence qualities, which include tolerance, social
justice, equality and responsibility. However, she was not able
to confi rm this hypothesis and concluded that hacktivists were
more motivated by achievement and hedonistic value types.
(It should be noted that Madarie herself stated that her sample
of hacktivists was quite small and that further research is
needed.)
We discussed these points during our interviews with two
hacktivists. The member of the group Tunisian Fallaga Team
made clear that his main motivation for defacing websites
was simply political. When we asked if any money was
involved in his activities, he strongly denied it. We probed
further into his personal motivations and asked how he
perceives the attention his attacks receive from the media. He
replied that any media attention is good, because his message
is read and spread among many people, and added that he has
a personal good feeling when he hacks. His words confi rm
once again the importance that hacktivists place on visibility,
and the positive feeling they get when involved in hacking.
Furthermore, he noted that too often he and his group are
identifi ed as terrorist ‘ISIS hackers’; he totally refuses this
label. The personal motivations also emerged in an interview
conducted with the spokesperson of Skynet Central, a group
of hacktivists active in limiting and possibly annihilating
online and offl ine terrorism. The interviewee said: ‘Every
time I take down a target I feel more proud than I could
describe and I feel like I prevent many crimes in the future,
adding: ‘it [is] something personal, the war between Skynet
and ISIS.’ He concluded: ‘[Hacking is] a hobby, I enjoy [it],
but [I am] directing my skills against evil’ [24].
MODUS OPERANDI
In this section we will focus on the capabilities and the modus
operandi of hacktivists when defacing websites. First we will
describe what usually triggers them to hack. Subsequently we
will analyse their usual attack vectors and fi nally we will give
an overview of the most commonly used tools.
Triggers
In order to determine if a specifi c website is likely to be
targeted by hacktivists it seems necessary to describe how
they choose their targets. According to Hald and Pedersen
[31], hacktivists deface websites that are perceived to be an
insult to their ideology. These may be web pages that belong
to organizations or companies that take a stance against a
certain cause, or they may be all websites in a specifi c
country or with a specifi c domain. An example is the above-
mentioned case of Anonymous that explicitly targeted
Chinese websites in order to spread awareness of Internet
censorship [22], while other episodes have been analysed by
Kaplan [17] and Kovac [14]. An interviewed member of
Tunisian Fallaga Team [19] explained that he tries to target
specifi c websites that have a link with a country he considers
a corrupted entity. However, as noted earlier, when hacktivists
engage in defacements they also ‘select apparently unrelated
sites designed simply to get the message to the maximum
number of eyeballs in the shortest possible time’ [11].
The selection of unrelated sites is not completely
unsystematic: the literature on the subject (validated by our
interviews) suggests that these random attacks are connected
to the use of specifi c tools, which identify websites that
present particular vulnerabilities [32]. A recent example that
clarifi es this chain of action was the severe but easily
exploitable [33] vulnerability discovered in the REST-API of
the popular WordPress CMS [34]. The websites containing
this vulnerability were most likely found using Google dorks,
which are often exploited by defacers [35]. After the
disclosure of this weakness in the system, several well-known
defacers (hacktivists as well as non-hacktivists) defaced a
large number of websites [33, 34].
Attack methods
Since many hacktivists choose targets based on their
vulnerabilities, it is to be expected, as supported by previous
studies [31, 32], that the vulnerabilities they exploit are often
known and quite unsophisticated, usually present in the
arsenal of automatic scanning tools. An analysis of the data
from the Zone-H Archive provides great insight into which
vulnerabilities are normally exploited. When analysing the
defacements motivated by political reasons and patriotism
between January 2010 and December 2016, the most common
form of attack (18%) used to access a web page is the
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
8VIRUS BULLETIN CONFERENCE OCTOBER 2017
exploitation of an SQL injection vulnerability. In 27% of the
cases a non-specifi ed web application bug was exploited. In
18% of the cases another kind of method was used to deface
the websites. In 7% of the cases a brute force attack was used
to gain access to the web server. In around 6% of the cases a
le inclusion vulnerability was used to deface the websites.
Other methods employed are: other known vulnerabilities
(6.32%), URL poisoning (3.76%), FTP server intrusion
(3.11%), social engineering (3%), shares misconfi guration
(2.38%), SSH server intrusion (2.18%), mail server intrusion
(1.15%), DNS attacks (0.6%), and man-in-the-middle (MitM)
attacks (0.3%).
Method Percentage
Other non-specifi ed web application bugs 27.22%
SQL injection 18.00%
Other methods 18.00%
Brute force attacks 7.00%
File inclusion 6.39%
Known vulnerabilities 6.32%
URL poisoning 3.76%
FTP server intrusion 3.11%
Social engineering 3.00%
Shares misconfi guration 2.38%
SSH server intrusion 2.18%
Mail server intrusion 1.15%
DNS attacks 0.60%
Man in the middle attacks 0.30%
Table 3: Percentage of the methods of attack used to deface
websites in the category ‘patriotism’ and ‘political reasons’ in
the period 2010-2016. (Source: Zone-H Archive.)
Mass defacements
In the case of mass defacements, a vast number of websites
are defaced in a very short time. The hacktivists behind these
attacks use automated scanning and exploitation tools to
automatically exploit known backdoors in web applications
[35, 36]. Just as with single defacements, specifi cally crafted
Google dorks can be used to select the targets [35]. The
exploits used in these attacks can be purchased on online
black markets. In some cases the exploits send a request to
report successful defacements automatically to the Zone-H
Archive [35]. From the analysis of the most active defacers,
we can confi rm that this method is widely employed and
seems to a have high rate of success.
TOOLS
As there have been few scientifi c studies specifi cally
investigating the tools hacktivists use when defacing a
website, reviewing the existing literature did not provide us
with a lot of insights. Some security fi rms, however, have
conducted preliminary technical analysis of hacktivists’
attacks. Fox-IT [2], for instance, has investigated the earlier
mentioned attacks (‘Netherlands Operation’). The
investigation shows that during the operation a (basic)
identifi cation tool, written in .NET, was used to locate Dutch
and German websites which were running a vulnerable
WordPress version using Google dorks. The fact that
hacktivists create their own tools or scripts is in line with the
answers given by the member of the Tunisian Fallaga Team
[19], who confi rmed that he creates his own scripts in order to
(automatically) deface a website. In addition to the creation of
their own tools, they also frequently use publicly available
vulnerability scanners, such as Acunetix or Havij [36, 37], as
again confi rmed in our interviews. Some hacktivists prefer to
completely automate the defacement process: in this case they
use tools which automatically fi nd a vulnerable website and
operate an exploit which uses a known vulnerability [35].
These tools include LFI intruder, SCT SQL SCANNER and
Priv8 RFI SCANNER v3.0 [35].
RESULTS AND CONCLUSION
In general, a web page defaced by a hacktivist or a hacktivist
group will display a socio-political message related to the
specifi c motivation behind the attack. In Figure 4 we provide
a good example of this trend, showing the defaced website
http://navstarter.com that was attacked by members of the
Tunisian Fallaga Team. It is clear from the text on the page
that the Tunisian Fallaga Team attempts to raise awareness of
confl icts where Muslims are involved. The hacktivists
submitted the defaced page to Zone-H, giving patriotism as
main reason for the attack.
It should be noted that the given reasons in the Zone-H
Archive are not always in line with the message or contents of
the defaced page. In some cases we did not fi nd any specifi c
message, but a simple tag (for instance ‘hacked by…’), as had
been suggested by Warren and Leitch [12]. In other cases,
especially for patriotism, hacktivists left behind the fl ag of a
certain country with some background music. In other cases
the defaced page does not promote any message, but
distributes a piece of malware.
To sum up, website defacement still represents one of the
main tools used by hacktivists to promote a socio-political
message. There are plenty of methods that an individual can
use to deface a website, and generally speaking they are not
as complicated as other forms of hacking. This means that
many people, especially young hackers who have just taken
their fi rst steps into the world of hacktivism, can easily
engage in actions in order to test their skills, gain visibility
and help in promoting a certain cause. We have seen that even
if the technique is 20 years old, it has not really lost its appeal
among hacktivists (at least when we analyse the trends of the
last six years). We have explained that hacktivists are
triggered by socio-political motivations and by patriotism
(which actually represents the primary motivation for
defacing). Hacktivism and defacements seem to be linked to
regional and international geo-political tensions, as shown in
several cases (the Israeli-Palestinian confl ict and Indian-
Pakistani tensions).
Finally, considering that to calculate a threat it is necessary to
know the intent of the individual (motivations of hacktivists)
and the capabilities (modus operandi and tools used by
hacktivists), we can conclude that hacktivism when connected
to website defacements does not represent a huge threat. This
point needs clarifi cation: it is not a huge threat for all those
companies, public organizations and governments that apply
standard levels of cybersecurity within their computer
networks. Even in the case of a defacement, the costs to
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
9VIRUS BULLETIN CONFERENCE OCTOBER 2017
Figure 4: Homepage of the Navstarter.com website defaced by member of Tunisian Fallaga Team.
restore the web pages would not be too signifi cant for a big
corporation, but it should warn about other possible
vulnerabilities present in the system.
The situation is different for small companies or personal
websites that do not apply good security measures or are not
updated. We can conclude that these seem to be the most
common targets because they are easier to reach and deface.
Therefore, for these, website defacements still represent a
relevant threat.
REFERENCES
[1] Pieters, J. (2017, March 14). Turkish hacker groups
focus cyberattacks on Dutch websites, incl. NL
Times. NL Times. http://nltimes.nl/2017/03/14/
turkish-hacker-groups-focus-cyberattacks-dutch-
websites-incl-nl-times.
[2] Fox-IT. (2017). Turkish hacktivism activity.
https://foxitsecurity.fi les.wordpress.com/2017/03/
20170323_turkish_hacktivism_writeup_public_fi nal.
pdf.
[3] Kharpal, A. (2017, March 15). Hundreds of Twitter
accounts including Bieber and Forbes hacked, calling
Germany, Netherlands ‘Nazi’. CNBC.
http://www.cnbc.com/2017/03/15/turkey-twitter-
accounts-hacked-germany-netherlands-nazis-forbes.
html.
[4] Samuel, A. W. (2004). Hacktivism and the future of
political participation. Ph.D. in Political Science,
department of Government, Harvard University,
Cambridge, Massachusetts.
[5] Denning, D. E. (2015). The Rise of Hacktivism,
Georgetown Journal of International Affairs,
September 8, 2015. http://journal.georgetown.edu/
the-rise-of-hacktivism/.
[6] Milan, S. (2015). Hacktivism as a radical media
practice. In Atton, C. (ed.) The Routledge
Companion to Alternative and Community Media.
New York: Routledge, 550-560.
[7] Denning, D. E. (2001). Activism, Hacktivism, and
Cyberterrorism: The Internet as a Tool for Infl uencing
Foreign Policy. In Arquilla, J.; Ronfeldt, D. (eds.)
Networks and Netwars: The Future of Terror, Crime,
and Militancy. Santa Monica: RAND, 239-288.
[8] Jordan, T.; Taylor, P. (2004). Hacktivism and
Cyberwars: Rebels with a cause. London: Routledge
[9] Melucci, A. (1995). The Process of Collective Identity.
Temple University Press. In Johnston, H.;
Klandermans, B. (eds.) Social Movements and Culture.
Minneapolis: University of Minnesota Press, 41-63.
[10] Milan, S. (2013). Social Movements and Their
Technologies. Wiring Social Change. Palgrave
MacMillan: London.
[11] Barber, R. (2001). Hackers profi led – Who are they
and what are their motivations? Computer Fraud &
Security, 2001(1), 14-17.
[12] Warren, M.; Leitch, S. (2010). Hacker taggers: A
new type of hackers. Information Systems Frontiers,
12 (4), 425-431.
[13] Karatzogianni, A. (2005). The politics of
cyberconfl ict: Ethnoreligious confl icts in computer
mediated environments. Ph.D. in Political Science,
Nottingham University, Nottingham.
[14] Kovacs, E. (2014, April 27). Cyber confl ict between
Indian and Pakistani hacktivists will not end any time
soon. Softpedia. http://news.softpedia.com/news/
Cyber-Confl ict-Between-Indian-and-Pakistani-
Hacktivists-Will-Not-End-Any-Time-Soon-439300.
shtml.
[15] Caldwell, T. (2015). Hacktivism goes hardcore.
Network Security, 5, 12-17.
[16] Krebs, B. (2015, April 15). FBI Warns of Fake Govt
Sites, ISIS Defacements. https://krebsonsecurity.com/
2015/04/fbi-warns-of-fake-govt-sites-isis-
defacements/.
[17] Kaplan, D. (2009, January 5). Web defacements
escalate as Israel moves farther into Gaza.
https://www.scmagazine.com/web-defacements-
escalate-as-israel-moves-farther-into-gaza/
article/555321/.
HACKTIVISM AND WEBSITE DEFACEMENT... ROMAGNA & VAN DEN HOUT
10 VIRUS BULLETIN CONFERENCE OCTOBER 2017
[18] Winer, S. (2015, April 7). Annual cyber-attack on
Israel targets MK’s website. The Times of Israel.
http://www.timesofi srael.com/annual-cyber-attack-
on-israel-hits-mks-website/.
[19] Tunisian Fallaga Team, (March, 2017). Interviewer:
Marco Romagna [email].
[20] Levy, S. (1984). Hackers: Heroes of the Computer
Revolution. New York: Doubleday.
[21] Coleman, G. (2014). Hacker, Hoaxer, Whistleblower,
Spy: The Many Faces of Anonymous. London and
New York: Verso.
[22] BBC (2012, April 5). Chinese websites ‘defaced in
Anonymous attack’. Retrieved from
http://www.bbc.com/news/technology-17623939.
[23] Olson, P. (2013). We Are Anonymous: Inside the
Hacker World of LulzSec, Anonymous, and the
Global Cyber Insurgency.
[24] Skynet Central, (December 2016 – May 2017).
Interviewer: Marco Romagna [Instant message via
Twitter].
[25] Himanen, P. (2001). The Hacker Ethic and the Spirit
of the Information Age. New York: Random House.
[26] Jordan, T.; Taylor, P. (1998). A sociology of hackers.
Sociological Review, 46 (4), 757-780.
[27] Chantler, N. (1995). Risk: The Profi le of the computer
hacker. Ph.D. thesis, Curtin Business School,
Australia.
[28] Mansfi eld-Devine, S. (2011). Hacktivism: Assessing
the damage. Network Security, 8, 5-13.
[29] Woo, H.; Kim, Y.; Dominick, J. (2004). Hackers:
Militant or Merry Pranksters? A Content Analysis of
Deface Web Pages. Media Psychology, 6, 63-82.
[30] Madarie, R. (2017). Hackers’ Motivations: Testing
Schwartz’s Theory of Motivational Types of Values
in a Sample of Hackers. International Journal of
Cyber Criminology, 11(1), 78-97.
[31] Hald, S. L.; Pedersen, J. M. (2012). An Updated
Taxonomy for characterizing hackers according to
their threat properties. In Advanced Communication
Technology (ICACT), 2012 14th International
Conference on (pp. 81 - 86). IEEE Press.
(International Conference on Advanced
Communication Technology).
[32] Furnell, S. (2003) Cybercrime: Vandalizing the
information Society. In: Lovelle J.M.C.; Rodríguez
B.M.G.; Gayo J.E.L.; del Puerto Paule Ruiz M.;
Aguilar L.J. (eds) Web Engineering. ICWE 2003.
Lecture Notes in Computer Science, vol. 2722.
Berlin, Heidelberg: Springer.
[33] Montpas, A.M. (2017, February 1). Content Injection
Vulnerability in WordPress. https://blog.sucuri.
net/2017/02/content-injection-vulnerability-
wordpress-rest-api.html.
[34] Maunder, M. (2017, February 10). Rapid Growth in
Defacements, Who was Hit, Who is Attacking.
https://www.wordfence.com/blog/2017/02/rapid-
growth-in-rest-api-defacements/.
[35] Jacoby, D. (2010, July 21). Mass Defacements: the
tools and tricks. https://securelist.com/36356/
mass-defacements-the-tools-and-tricks/.
[36] Carr, J. (2011). Inside Cyber Warfare: Mapping the
Cyber Underworld (2nd ed.). Sebastopol, CA:
O’Reilly Media.
[37] Imperva. (2012). Imperva’s Hacker Intelligence
Summary Report The Anatomy of an Anonymous
Attack. https://www.imperva.com/docs/HII_The_
Anatomy_of_an_Anonymous_Attack.pdf.
... Top-ranking cybercrime references define website defacement as an illegal electronic attack (hack) of a webpage which changes the webpage's appearance [1][2][3], including replacement of the site's content with political, ideological, profane, or inappropriate content [4]. Defacement may be carried out on servers owned by the organization the attacker(s) have chosen [1,5]. ...
... Top-ranking cybercrime references define website defacement as an illegal electronic attack (hack) of a webpage which changes the webpage's appearance [1][2][3], including replacement of the site's content with political, ideological, profane, or inappropriate content [4]. Defacement may be carried out on servers owned by the organization the attacker(s) have chosen [1,5]. Previous studies [6][7] have outlined the common types of website defacement attacks, including unauthorized access, SQL injection, cross-site scripting (XSS), DNS hijacking, and malware infection [8,9]. ...
... At present, most web pages are vulnerable to defacement and hacktivism [1,12]. Mindful and continuously aware websites are often the only websites that are considered safe from destructive defacement threats. ...
Article
Full-text available
Website defacement is the illegal electronic act of changing a website. In this paper, the capabilities of robust machine learning classifiers are exploited to select the best input feature set for evaluation of a website’s defacement risk. A defacement mining data set was obtained from Zone-H, a private organization, and a sample consisting of 93,644 data points was pre-processed and used for modelling purposes. Using multi-dimensional features as input, enormous modelling computations were carried out to determine the optimal outputs, in terms of performance. Reason and hackmode presented the highest contributions for the evaluation of website defacement, and were thus chosen as outputs. Various machine learning models were examined, and decision tree (DT), k-nearest neighbours (k-NN), and random forest (RF) were found to be the most powerful algorithms for prediction of the target model. The input variables 'domain', 'system', 'web_server', 'redefacement', 'type', 'def_grade', and 'reason/hackmode' were tested and used to shape the final model. Using the cross-validation (CV) technique, the key performance factors of the models were calculated and reported. After calculating the average scores for the hyperparameter metrics (i.e., max-depth, min-sample-leaf, weight, max-features, and CV), both targets were evaluated, and the learning algorithms were ranked as RF > DT > k-NN. The reason and hackmode variables were thoroughly analysed, and the average score accuracies for the reason and hackmode targets were 0.85 and 0.585, respectively. The results comprise a significant development, in terms of modelling and optimizing website defacement risk. This study successfully addresses key cybersecurity concerns, particularly website defacement.
... Candra Kurniawan 1 , Agung Triayudi 2 278 vulnerabilities include web application bugs, SQL Injection, SSH and FTP server brute force, and File inclusion [15]. ...
... In conducting these tests, several attacks are carried out to trigger activities on the target system, thereby sending alerts to the SOC system. The attack activities are based on the initial access, which serves as the entry point for web defacement attacks, one of which is brute force attack [15] [18]. The following are the two attacks conducted during testing: ...
Article
Full-text available
The cybersecurity landscape in Indonesia recorded an increase in cyberattacks in 2022. One of the types of attacks observed was web defacement attacks targeting government websites. In 2022, there were a total of 2,348 web defacement attacks in Indonesia, with the majority occurring in the governmental sector. In proactive efforts to monitor and prevent web defacement attacks, this study implemented the open-source tool Wazuh and activated the file integrity monitoring module to detect file changes in the system. Testing was conducted with two types of attacks: brute force attacks to gain system access and web defacement attacks involving script insertion to trigger alerts from the file integrity monitoring. The results of the testing show that the implementation of Wazuh and the file integrity monitoring module can real-time detect malicious activities and file additions, so that it can be used to mitigate cyberattacks.
... In 2019 the FDA issued a mandatory recall of the company's insulin pumps, again citing cybersecurity concerns, which could enable malicious parties to manipulate (from distance) insulin delivery to patients, leading to hypoglycemia or high blood sugar and potentially life-threatening diabetic ketoacidosis (DKA) (FDA 2021). Another risk that could affect the integrity of hospital data is the defacement of healthcare websites by hacktivists, due to worldwide increasing geopolitical tensions (European Union Agency for Cybersecurity 2023; Romagna and Hout 2017). The defacement of these websites could lead to potentially misinformed patients and a decrease of trust in healthcare organizations. ...
Chapter
This chapter introduces the reader to current technological trends that are shaping the healthcare sector and the pressing cyber security risks associated with these trends. The importance of phishing as a common attack vector is highlighted and the execution of phishing training simulations as a behavioral intervention is described. In the discussion section some challenges regarding the use of the COM-B framework as a basis for network-oriented models are discussed and potential future improvement opportunities are highlighted. Following the description of a phishing training simulation scenario, a multi-level adaptive network model based on key elements of the COM-B framework is described.
... The IT Army for Ukraine -hackers around the world who disrupt Russian government web services or power supplies -collectively invest a significant amount of time and risk revenge from the perpetrator government (Shore, 2022). This type of allyship action -hacktivism -is usually associated with socio-political motivations although thrill-seeking and increasing self-esteem may also play an important role (Romagna & Van den Hout, 2017). This type of allyship may specifically interfere with the perpetrator's war actions; for example, anti-war activists blocked the Polish-Belarus border to delay the transport of goods to Belarus and Russia (Sukhov, 2022). ...
... They can have serious consequences, including damage to an organization's reputation, loss of trust from users, and possible disruption of online services [4]. Hacktivists tend to use website defacement as an essential tool for promoting their socio-political and ideological goals Samuel et al. [15,16] claims that it requires breaking into a web server to swap out a page with a statement that reflects these opinions. Many of the defacements that occurred in 2004 probably targeted particular organizations, usually governments or companies, in an attempt to draw attention to and protest their actions. ...
Article
Full-text available
Malicious URLs are a serious threat to cybersecurity because they can compromise user security and inflict large financial losses. The extensiveness and adaptability of traditional detection approaches which rely on blacklists are limited when it comes to rapidly emerging threats. In response, machine learning methods have become more popular as a means of improving the detection efficiency of malicious URLs. This paper provides a thorough analysis providing a structured understanding of all aspects and formal formulation of the machine learning job of malicious URL detection. It covers feature representation and algorithm design, classifying and reviewing contributions from literature studies. The survey aims to provide a state-of-the-art understanding and support future research and practical implementations. It targets a diverse audience, including experts, cybersecurity professionals and machine learning researchers. The article provides a comprehensive overview of the field discussing practical system design considerations, ongoing research challenges and future research directions.
Article
Full-text available
The swift proliferation of Internet of Things (IoT) devices has presented considerable challenges in maintaining cybersecurity. As IoT ecosystems expand, they increasingly attract malware attacks, necessitating advanced detection and forensic analysis methods. This systematic review explores the application of deep learning techniques for malware detection and forensic analysis within IoT environments. The literature is organized into four distinct categories: IoT Security, Malware Forensics, Deep Learning, and Anti-Forensics. Each group was analyzed individually to identify common methodologies, techniques, and outcomes. Conducted a combined analysis to synthesize the findings across these categories, highlighting overarching trends and insights.This systematic review identifies several research gaps, including the need for comprehensive IoT- specific datasets, the integration of interdisciplinary methods, scalable real-time detection solutions, and advanced countermeasures against anti-forensic techniques. The primary issue addressed is the complexity of IoT malware and the limitations of current forensic methodologies. Through a robust methodological framework, this review synthesizes findings across these categories, highlighting common methodologies and outcomes. Identifying critical areas for future investigation, this review contributes to the advancement of cybersecurity in IoT environments, offering a comprehensive framework to guide future research and practice in developing more robust and effective security solutions.
Article
Full-text available
Artificial Intelligence (AI) is a technological achievement that simulates human intelligence through machines or computer programs. The integration of AI in military operations aims to minimize combatant casualties and enhance effectiveness in warfare. Despite the advantages and significance of this research, concerns arise regarding the ideal implementation of AI in armed conflicts due to potential security challenges. A significant issue lies in the legal perspective governing AI as a comprehensive defense tool. This paper employs a juridical normative research method based on a statutory approach to provide a descriptive analysis and examine the regulatory framework surrounding AI in armed conflict. The results indicate that the absence of comprehensive regulations complicates the accountability framework, making liability determination intricate, particularly when AI malfunctions due to substandard quality or improper use. In such cases, accountability may extend to both the creator and the user. The concept of liability for violations in armed conflict is explored according to international law, highlighting the implications and associated responsibilities of using AI within legal principles. This paper concludes that AI regulation must be crafted to ensure usage aligns with established procedures within the framework of international law.
Conference Paper
Full-text available
In this paper, we use Machine Learning models for malicious URL detection and classification by Feature Engineering techniques. These models were implemented with scikit-learn using Random Forest, Support Vector Machine and XGBoost classifier algorithms. Our models were trained, tested, and then optimized with a dataset of 641,125 URLs (benign, defacement, malware, and phishing) from several sources including ISCX-URL2016 from the University of New Brunswick. Through iterative learning, we have shown that the combination of certain hyperparameters and features reduces the false positive rate. The results obtained are interesting with scores close to 100% and zero false positive rates for some types of URLs. We then evaluated the performance of the models against other related works models.
Chapter
Cybercriminals are an elusive population to study. This makes social research with cybercriminals as valuable as it is scarce. To stimulate research on cybercriminals, it is important that researchers share their insights on successful and unsuccessful approaches, strategies, and techniques. This chapter collects our fieldwork experiences researching cybercriminals, potential cybercriminals, hackers, and hacktivists. After presenting the phases of our fieldwork, we outline six research techniques we have applied and discuss the ethical issues involved. We conclude with some lessons learned and methodological perspectives to guide future research.
Article
Full-text available
Although much has been written on topic of hacker motivations, little empirical research has been conducted and even less research has attempted to quantify hackers' motivations. The present study analyses relationships between the frequency of several hacking behaviours and motivations to hack in a sample of male hackers and potential hackers. Motivations frequently recurring in the literature are assessed and Schwartz's (1992) Theory of Motivational Types of Values is applied. A preference for self-transcendence and openness to change values was found in the whole sample. Intellectual challenge and curiosity were rated as the most important motivators to circumvent security systems. However, correlation analyses signified the importance of aversion of conservation values. Hackers appear to be more motivated by what they dislike rather than by what they value. Future studies are needed to further examine the discrepancy between hackers' ranking of motivations and the relationship between motivations and hacking behaviours.
Book
Now in paperback for the first time, Social Movements and their Technologies explores the interplay between social movements and their 'liberated technologies'. It analyzes the rise of low-power radio stations and radical internet projects ('emancipatory communication practices') as a political subject, focusing on the sociological and cultural processes at play. It provides an overview of the relationship between social movements and technology, and investigates what is behind the communication infrastructure that made possible the main protest events of the past fifteen years. In doing so, Stefania Milan illustrates how contemporary social movements organize in order to create autonomous alternatives to communication systems and networks, and how they contribute to change the way people communicate in daily life, as well as try to change communication policy from the grassroots. She situates these efforts in a historical context in order to show the origins of contemporary communication activism, and its linkages to media reform campaigns and policy advocacy. © Stefania Milan 2013. Foreword, DeeDee Halleck 2016. All rights reserved.
Article
This thesis argues that it is important to distinguish between two different phenomena in cyberpolitical spaces: First of all, between ethnic or religious groups fighting over in cyberspace, as they do in real life (Ethnoreligious cyberconflict) and second, between a social movement and its antagonistic institution (Sociopolitical cyberconflict). These different kinds of cyberconflict can be explained in the context of international conflict analysis for ethnoreligious cyberconflict and social movement theory for sociopolitical cyberconflict, while keeping in mind that this takes place in a media environment by using media theory. By combining elements of these approaches and justifying the link to cyberconflict, it is possible to use them as a theoretical light to look at the environment of Cyberconflict (CC) and analysis of incidents of CC. Consequently, this work looks at the leading groups using the internet either as weapon or a resource against governments, while also looking at networks, international organisations and new social movements. Searching for a satisfactory theoretical framework, I propose the following parameters to be looked at while analysing cyberconflicts: 1. Environment of Conflict and Conflict Mapping (real and virtual). The world system generates an arborescent apparatus, which is haunted by lines of flight, emerging through underground networks connected horizontally and lacking a hierarchic centre (Deleuze and Guattari). The structure of the internet is ideal for network groups, (a global network with no central authority) has offered another experience of governance (no governance), time and space (compression), ideology (freedom of information and access to it), identity (multiplicity) and fundamentally an opposition to surveillance and control, boundaries and apparatuses. 2. Sociopolitical Cyberconflicts: The impact of ICTs on: a. Mobilising structures (network style of movements using the internet, participation, recruitment, tactics, goals), b. Framing Processes (issues, strategy, identity, the effect of the internet on these processes), c. Political opportunity structure (the internet as a component of this structure), d. hacktivism. 3. Ethnoreligious Cyberconflicts: a. Ethnic/religious affiliation, chauvinism, national identity, b. Discourses of inclusion and exclusion, c. Information warfare, the use of the internet as a weapon, propaganda and mobilisational resource d. Conflict resolution depends on legal, organisational framework, number of parties issues, distribution of power, values and beliefs. 4. The internet as a medium: a. Analysing discourses (representations of the world, constructions of social identities and social relations), b. Control of information, level of censorship, alternative sources, c. Wolsfeld: Political contest model among antagonists: the ability to initiate and control events, dominate political discourse, mobilise supporters, d. Media effects on policy (strategic, tactical, and representational).
Book
As global society becomes more and more dependent, politically and economically, on the flow of information, the power of those who can disrupt and manipulate that flow also increases. In Hacktivism and Cyberwars Tim Jordan and Paul Taylor provide a detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics. They describe the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. A full explanation is given of the different strands of hacktivism and the 'cyberwars' it has created, ranging from such avant garde groups as the Electronic Disturbance Theatre to more virtually focused groups labelled 'The Digitally Correct'. The full social and historical context of hacktivism is portrayed to take into account its position in terms of new social movements, direct action and its contribution to the globalization debate. This book provides an important corrective flip-side to mainstream accounts of E-commerce and broadens the conceptualization of the internet to take into full account the other side of the digital divide.
Article
Using news reports of incidents and events, this work demonstrates how the Internet is altering the landscape of political discourse and advocacy. Three broad classes of activity are considered: activism; hacktivism; and cyberterrorism. It is shown that the Internet can be an effective tool for activism. With respect to hacktivism and cyberterrorism, those who engage in such activity are less likely to accomplish their foreign policy objectives than those who do not employ disruptive and destructive techniques.
Article
Hacktivism is no longer driven by well-meaning amateurs or bored teenagers, if it ever was. The nature of hacktivism is changing and cause-based activism typified by the Anonymous collective is being replaced by heavy-duty, politicised attacks by the likes of the Syrian Electronic Army and ISIS - or even attacks carried out by nation states. Hacktivism intended for social and political protest can have unintended (or intended!) impacts on organisations of all sizes caught in the cyber crossfire.
Conference Paper
The objective of this paper is to give an up-to-date terminology for and categorization of hackers on the Internet, and to characterize each category of hackers by their threat properties. To be able to prioritize defense efforts, security experts need an accurate taxonomy of attackers for the production of detailed and precise threat assessments. We take an existing taxonomy for hackers and update it to correspond to the terminology used by hackers and security experts. Also, the categories of hackers are updated to reflect the threat properties demonstrated in recent attacks, and each category is described in terms of motivations, capabilities, triggers, methods, and trends. The result is a current and detailed taxonomy usable in planning of digital defense efforts as well as in forensics after an attack has occurred.
Article
A great many people see all hackers as immature, spotty teenagers with good computer skills and no regard for the damage they do when they hack systems. The truth is very different. The hacker community as a whole is a very broad church. This article will aim to define a number of different groups of hackers, analyse their motivations and look at the sort of threats they pose to businesses.