The rise of the chaotic actor

The past year saw the emergence of a series of cleverly named hacking groups like Anonymous, LulzSec, and TeaMp0isoN. In 2011, these groups brought the fight to corporate America, crippling firms both small (HBGary Federal) and large (Sony). As the year drew to a close these groups noticeably shifted from prank-oriented hacks for laughs (or “lulz”), aligning themselves with political movements like Occupy Wall Street and using their skills to lend material and virtual support to the protests in various cities.

The past year saw the emergence of a series of cleverly named hacking groups like Anonymous, LulzSec, and TeaMp0isoN. In 2011, these groups brought the fight to corporate America, crippling firms both small (HBGary Federal) and large (Sony). As the year drew to a close these groups noticeably shifted from prank-oriented hacks for laughs (or “lulz”), aligning themselves with political movements like Occupy Wall Street and using their skills to lend material and virtual support to the protests in various cities. It was an Anonymous-linked group, after all, that discovered and leaked the identity of pepper-spraying police officers in both the New York and Davis, California protests. Supporting populist figures like the student protestors at UC Davis is just good PR, but it also plays into the larger Anonymous narrative about using asymmetric force against abuse of individual liberties by corporations and governments. Joshua Corman, of the firm Akamai, has suggested that 2012 will bring further segmentation of what used to be known as “Anonymous,” as some elements pursue political and socially constructive ends like income inequality, child exploitation or weeding out corruption, while more extreme elements within Anonymous carry out ever more bold – and alienating – attacks against targets of their choosing.

Suggested articles

2020 Cybersecurity Trends to Watch

Mobile becomes a prime phishing attack vector, hackers will increasingly employ machine learning in attacks and cloud will increasingly be seen as fertile ground for compromise.

Top Mobile Security Stories of 2019

Cybercrime increasingly went mobile in 2019, with everything from Apple iPhone jailbreaks and rogue Android apps to 5G and mobile-first phishing dominating the news coverage. Here are Threatpost’s Top 10 mobile security stories of 2019.