Jump to content

Draft:GlorySec

From Wikipedia, the free encyclopedia
  • Comment: No evidence of notability? The majority of citations are to unreliable sources like Telegram, YouTube, Twitter, etc. Large sections of text are completely unsourced. Please remove the external links from the body of the article. C F A 💬 17:37, 4 August 2024 (UTC)
  • Comment: This draft is overly reliant on primary sources, especially the group's Telegram and X/Twitter. Where possible, these sources should be replaced with secondary sources unaffiliated with the subject. External links in the body of the article should also be removed per WP:ELNO. gobonobo + c 08:29, 4 August 2024 (UTC)

GlorySec
Formation9 August 2023
FounderCharon
TypeHacking
PurposeExpressing Anarcho-capitalist beliefs and supporting the West through Hacktivism
Membership
Unknown (estimated 30+)
LeaderCharon Wheezy (determined by a monthly election)
Parent organization
Gloria Quaerere
AffiliationsGloria Quaerere, GloryScroll, GloryEnd, Albanian GlorySec, GloryKill, GlorySA, GloryData

GlorySec, otherwise known by their unabridged name Glory Security, is an active hacktivist group known for their attacks on multiple countries. For instance, one of these attacks included airdropping worm-type malware stored on USB sticks in Venezuela, Guyana City. This was done in opposition to Maduro's regime, such as his human rights violations, economic mismanagement and erosion of democratic institutions. The estimated damage of this malware has been said to affect 100 companies. GlorySec align themselves under the belief of Avaritionism/Anarcho-capitalism and they have expressed their beliefs many times, carrying out their attacks under this belief and their attacks have brought attention to the malpractices of many countries, something they share in common with other hacktivist groups, GlorySec has started operations such as #OPVenezuela #OPPRC #OPChina #OPTerrorism #OPRussia.

GlorySec originally saw its advent upon the splitting of the original group GloryScroll, which birthed the group as it is known today. The group is a part of a chain of groups that make up the collective known as Gloria Quaerere founded by Charon Revv, which translates from Latin to "To Seek Glory" or may be reiterated as "To seek knowledge". The group remains active to this day, with a series of campaigns targeting countries that oppose the West or countries allied with it.

Beliefs and alignment

[edit]

As is visible from their official Telegram group channel, the group is known for their beliefs in Avarationism and Anarcho-capitalism and it is expressed in the various political views they are seen to have. They align themselves with the West and have been doing so since their inception. Their earliest activity consisted of DDoSing Russian websites as well as helping Taiwanese and Japanese websites to secure themselves, both of which are Western allies. On the contrary, countries like Russia, Venezuela, China, North Korea are perceived as enemies to GlorySec. They stand against communism and target these countries for various reasons, mainly for their standing against the West and malpractices.[1]

GlorySec's ideological beliefs

[edit]

Anarcho-Capitalism

[edit]

Individual Liberty: Anarcho-capitalism prioritizes individual freedom and autonomy. GlorySec advocates for a society where individuals have complete control over their lives and property without coercive interference from the state. This belief in personal sovereignty aligns with their operations, which often aim to expose and dismantle structures perceived as infringing on individual rights.

Free Markets: A core tenet of anarcho-capitalism is the belief in free-market capitalism as the most efficient and just economic system. GlorySec supports the idea that voluntary trade and competition lead to innovation, prosperity, and the fair distribution of resources. They argue that economic interactions should be governed by market forces rather than state-imposed regulations.

Minarchism

[edit]

Minimal Government (Minarchism): While Anarcho-Capitalism advocates for the elimination of the state, minarchism supports a minimal state whose only roles are to protect individuals from aggression, theft, breach of contract, and fraud. GlorySec believes that a minimal state can effectively uphold individual rights and maintain order without encroaching on personal freedoms and economic activities, GlorySec believes to achieve Anarcho-Capitalism you have to slowly process from Minarchism towards Anarcho-Capitalism

Avaritionism

[edit]

GlorySec's involvement in cybercrime and hacking is seen as a means to an end. They believe that these actions are justified if they help to destabilize authoritarian regimes and promote the establishment of anarcho-capitalist societies. In this context, Avaritionism's emphasis on acting according to one's desires aligns with their approach to using any means necessary to achieve their goals.

Opposition to Communist States

[edit]

GlorySec's opposition to communist states is rooted in several key arguments

Suppression of Dissent

[edit]

Communist states are often criticized for their authoritarian tendencies and suppression of political dissent. GlorySec values transparency, freedom of expression, and accountability. They oppose regimes that restrict these freedoms and stifle opposition, seeing such practices as antithetical to their vision of a free and open society.

State Control and Coercion

[edit]

Communist states are often characterized by significant state control over the economy and individual lives. GlorySec opposes such control, viewing it as a violation of personal freedoms and an impediment to individual autonomy. They argue that state coercion in communist regimes undermines the principles of voluntary association and free markets.

Economic Inefficiency

[edit]

GlorySec critiques communist economic systems as inherently inefficient. They believe that central planning and the absence of market signals lead to resource misallocation, lack of innovation, and economic stagnation. In contrast, they advocate for free markets, which they argue are more dynamic and responsive to human needs and preferences.

Timeline of attacks

[edit]

These attacks come as is written from their official Telegram channel. Where articles are written on an attack, they will be referenced as usual. These are attacks they have claimed responsibility or joint-responsibility for.

Minor activity

[edit]

August 9 2023 - September 8 2023

[edit]

Between these dates just after their inception, GlorySec claimed responsibility for multiple data-breaches, ranging from a site based in Veliky Novgorod to DDoSes on multiple Russian websites and performing UDF payloads.

National Bank of Pakistan breach

[edit]

Directly after establishing new management behind the scenes, on September 9th 2023, they breached the National Bank of Pakistan. They claimed access to the personal information of all investors of the bank through this breach and uncovered 1.7 gigabytes of data through this breach which they then leaked on their public channel. Through this breach, GlorySec accused investors of supporting and supplying 21 terrorist groups including ISIS, Al Qaeda and the Taliban. The attack was done as a result of Pakistan strengthening their relations to Iran and Russia. While it is unknown if this attack was done through the efforts of GlorySec or whether they claim joint-responsibility for this with other hacker groups, this is where their collaborations began with GhostSec and KromSec. This is also where their campaign #OPTerrorism began.[2][3]

Parliament of Pakistan breach

[edit]

Some time after the National Bank of Pakistan breach in what seemed to a follow-up attack, on September 14th 2023, they breached the Parliament of Pakistan in a breach that contained 4.3 gigabytes of data, leaking data of every politician in Pakistan. The database of the Parliament of Pakistan was leaked and while it is unknown whether any specific follow-up attacks were done through this data, it is known that this attack was completed in opposition to Pakistan's support to Al Qaeda and other groups of the like.[4][5]

Attacks on high profile Russian government websites

[edit]

On September 19th 2023, GlorySec performed attacks on high profile Russian government websites (specifically kremlin.ru, gov.ru and government.ru). The DDoS attack took down their websites and meant that the websites were inaccessible to over 30 countries.[6][7]

June 27, 2024 GlorySec released the Republic of China Emblem on their Telegram channel depicting a clear support in Freeing Chinese people from the CCP[8]

Maria Vladimirovna Vorontsova and Jorrit Joost Faassen dox

[edit]

A dox that originally began with DoomSec, it was later continued and published on September 23rd 2023, adding on extra personal information of Maria Vladimirovna Vorontsova and added the personal information of Jorrit Joost Faassen. These doxes were likely done as a result of Maria Vladimirovna Vorontsova being the daughter of Vladimir Putin. Jorrit Joost Faassen was revealed to be oligarch that works for Gazprom through this dox, his motives (from the perspective of GlorySec) believed to be driven around money.[9]

Government of South Africa (ORTAMBODM) breach

[edit]

In partnership with Anonymous, this data-breach (estimated worth supposedly $10,000) was released by GlorySec on September 30th 2023 for free in opposition to both the Government of South Africa but also to send a message to other hacktivist group, challenging their standing as hacktivists. GlorySec challenged the intentions of hacktivism groups labelling them as 'evil.'[10]

Cyber attack on Palestine

[edit]

In response to the Israel-Palestine conflict and in their expression of disaccord with Hamas, GlorySec released a data dump on November 30 2023 containing an estimated amount of 500 gigabytes of PCBS data. The data contained confidential data in connection to Palestine's government institutions and while the hack gained them access to the entire database, in a deliberate move, they did not disclose the entire database; instead opting to disclose specific information. This data dump was believed to be done in a move to seize victory over Hamas in their cyber war; however with no conclusions to the conflict, this is uncertain.[11][12][13][14][15][16][17][18][19][20][21][22][23]

Cyber Attack on Iran

[edit]

After their return to activity on January 13th 2024, GlorySec claimed responsibiltiy for attacks on an estimated 50 Iranian websites, performing data dumps on them. Shortly after this on January 17th 2024, in response to an attack from the Houthi movement on US cargo ships, GlorySec under their #OPTerrorism campaign, dumped multiple Iranian and Yemeni websites including an Iranian plantation and laboratory.[24][25]

Attack on Russia's Greenfield and Technology Sectors

[edit]

On February 16th 2024, it was announced that with the efforts of their members, they had been continuing their activity behind the scenes and to show this, a "sample" dump was shown containing dumped data on a Russian construction company. Two days later on February 18th 2024, GlorySec released data dumps on Russia's greenfield & technology sectors. The data seized was 35 gigabytes of data on Russia's greenfield sector, and 1 gigabyte of data on Russia's technology sector.[26]

Attack on Russian FSB and Russian State Duma

[edit]

On March 15th, 2024, GlorySA, a newly launched group within Gloria Quaerere, officially joined the #OPRussia campaign. They announced their arrival with a significant cyber attack, claiming access to secret FSS (FSB), FIS (SVR), and MID (GRU) files for use in future operations. In this initial operation, GlorySA successfully attacked and downed the FSB and the Russian State Duma websites, marking their entrance into the cyber warfare scene alongside GlorySec.[27][28]

Attack on Russian production and Ministry of Safety

[edit]

On March 18th, 2024, GlorySec executed a follow-up cyber attack targeting the Russian production sector and the Ministry of Safety. This operation resulted in the infiltration and data dump of 13 gigabytes of sensitive information from these entities. This attack is part of their ongoing #OPRussia and #OPTerrorism campaigns aimed at disrupting Russian operations and advocating for the liberation of the Russian people. Here we see them crediting operators inside their post, Charon Stab, Charon Residual, and Charon Dex. Afterwards, they credit themselves inside their files.[29][30]

Warning to Bangladesh and Indonesia

[edit]

On March 29th, 2024, GlorySec issued a serious warning to the governments of Bangladesh and Indonesia, accusing them of neglecting their citizens who are engaging in malicious cyber activities targeting American and Argentinian infrastructure. GlorySec has already targeted 2000 Bengali and Indonesian websites in response to these activities. GlorySec provided IP addresses of one of the Bengali black hats to aid in the apprehension. Additionally, GlorySec released a data dump related to Bangladesh. GlorySec emphasized the urgency of their ultimatum. This operation was a part of their ongoing #OPTerrorism campaign, reflecting their commitment to combating cyber threats and holding accountable those who support or engage in cyber terrorism.[31][32]

Operation against China

[edit]

On April 6th, 2024, GlorySec launched a significant operation targeting the People's Republic of China, demanding an end to the atrocities committed against the people of Tibet, Xinjiang, and the practitioners of Falun Gong. The group called for justice and freedom, condemning historical and ongoing human rights abuses, GlorySec emphasized that the true China is embodied by the Republic of China and that Chinese land rightfully belongs to its people. This operation is part of their ongoing #OPTerrorism campaign, calling for a turning point in history where the oppressors are vanquished, and the oppressed are set free.[33]

July 11, 2024 GlorySec released the Free Russian flag on their Telegram channel depicting a clear support in Freeing Russian people from Kremlin[34]

Operation against CSTO

[edit]

On April 6th, 2024, GlorySec also focused on the Collective Security Treaty Organization (CSTO), demanding an end to injustices within its member states, particularly highlighting concerns about Russia's actions. GlorySec stands against dictatorship and oppression, advocating for the liberation of the Russian people from authoritarian rule. Data Released: Russian, Armenian, Iranian Data[35]

Operation against Venezuela

[edit]

On April 6th, 2024, GlorySec targeted Venezuela, condemning the leadership of President Nicolás Maduro for human rights abuses and political repression. The operation highlighted several critical issues:

Political Repression: The Maduro government has been criticized for suppressing political dissent and opposition voices. Reports suggest arbitrary arrests, censorship, and intimidation tactics are used to silence critics and maintain power. Economic Crisis: Venezuela is in the midst of a severe economic crisis marked by hyperinflation, shortages of basic goods, and a sharp decline in living standards. Many attribute this crisis to government mismanagement and corruption. Humanitarian Crisis: The economic downturn has led to a humanitarian crisis, with millions of Venezuelans lacking access to adequate food, medicine, and healthcare. The situation has forced many to flee the country in search of better living conditions. Violence and Crime: Venezuela has one of the highest homicide rates globally, with widespread violence and crime. Critics argue that the government has failed to address the root causes of these issues. Allegations of Election Fraud: Elections in Venezuela, including the controversial 2018 presidential election, have been marred by allegations of fraud and irregularities. Many international observers have questioned the legitimacy of these elections.

Despite these challenges, the Venezuelan government often denies allegations of wrongdoing, blaming external factors such as sanctions and foreign interference for the country's problems. The people of Venezuela continue to endure immense hardship, and it is crucial for the international community to support efforts to address the crisis and uphold human rights in the country.

GlorySec released Venezuelan data and seized multiple Venezuelan Websites [Venezuela Website Seized] [Venezuela Website Seized] [Venezuela Website Seized] [Venezuela Website Seized]

[35][36][37][38]

Access to nuclear arsenals

[edit]

On April 15th, 2024, GlorySec announced they had gained access to nuclear arsenals of enemy countries through a recent malware attack. They claimed to possess a secret malware capable of spreading throughout entire nations, making them the first hacktivist group with access to nuclear weapons. GlorySec warned that any detected deployment of nuclear weapons by these regimes would lead to a retaliatory shutdown of their systems and use of the hacked nuclear weapons. They also stated that they had begun redirecting the enemy's own missiles and drones back at them.[39][40]

Internal Changes and Elections

[edit]

On April 19th, 2024, GlorySec announced the demotion and exile of their former owner, Charon Stab, following a collaborative decision by higher management. They introduced elections for the new owner due to a tie in the initial member vote.

First Candidate:

Charon Residual: Collaborated in many dumps, current Operate Manager.

Second Candidate:

Charon Retract: Collaborated in many dumps, past owner after fqw, current Operate Helper. GlorySec stated that they would hold owner elections every month from now on.[41][42]

Post-Election Announcement

[edit]

On April 21st, 2024, following the recent elections, GlorySec announced a change in leadership and operations under the new owner, Charon Residual. As part of their continued efforts to bring about change, GlorySec revealed their successful hack of the Venezuelan Central Bank and the ruling United Socialist Party of Venezuela, accusing them of falsifying elections and being illegitimate rulers.

Details Released:

Venezuelan Central Bank Admin Account Venezuelan Central Bank Admin Password (hashed) United Socialist Party of Venezuela Admin Account United Socialist Party of Venezuela Admin Password (hashed) GlorySec declared control over Venezuela's information and the entire Central Bank, demanding that the government meet the people's demands or face action from Western governments. They called for the Venezuelan people to take power, seize the National Assembly, and challenge the current rulers.

GlorySec also stated their intention to continue exposing and targeting other "evil websites" publicly.[43][36]

Operation Against Indonesia

[edit]

On May 14th, 2024, GlorySec announced the initiation of #OPIndonesia, aligning it with their ongoing #OPTerrorism campaign. The operation is a response to the activities of Indonesian hacktivist groups and the perceived slow action by the Indonesian government against them.

GlorySec introduced the Indonesian Hackers Lorebook, a publication aimed at identifying and doxing every Indonesian hacker entering Western cyberspace. They stated that they would respond in kind if these hackers engaged with them and would collaborate with Indian hacktivists to further their efforts.

GlorySec also expressed continued support for the Georgian people, inviting suggestions via their Twitter account and emphasizing their aim to assist rather than harm Georgia.[44][45][46][47][48][49]

GlorySec Second Elections

[edit]

On May 19th, 2024, GlorySec announced their second elections, renaming the title of Owner to President. The candidates for the presidency are:

Charon Retract: A past president following a brief presidentship of "fqw" and after Charon Death/Residual retired. He has contributed to many breaches and shown strong management skills. Supported by the current administration and GSR.

Promises: "I promise that we WILL make a change and that operations will be in place."

Charon Death (formerly known as Charon Residual): A past president elected after Charon Stabs' presidency. He briefly retired due to critiques but promises change if he returns. Supported by the old brief GSR during Charon Stabs' leadership.

Promises: "I'll promise to do a big operation which will include a big breach."

Charon Wheezy: A normal member, supported by a few retired GlorySec Charon members from a specific community which they went on to own.

Promises: "If I get elected, I promise to focus on what truly matters to GlorySec."

Charon Lurjan: A normal member, supported by the Albanian GlorySec charter.

Promises: "Unity and Progress for a Prosperous Albania."

Charon:

Promises:

Poll: Presidential/Ownership Elections

Members of GlorySec are encouraged to cast their votes and participate in shaping the future leadership of the organization.[50]

GlorySec Presidential Election Results

[edit]

On May 21st, 2024, GlorySec announced that Charon Retract had won the presidential elections. To celebrate Retract's victory and the death of the Iranian "President," they hijacked Khamenei.ir and doxed Iran's supreme leader, Khamenei. GlorySec stated they are actively working on multiple fronts, including Venezuela, China, Russia, Yemen, terrorists, Iran, Pakistan, Georgia, Indonesia, North Korea, and other countries whose hackers have entered Western cyberspace.[51][52]

Operation Against Venezuela

[edit]

On May 27th, 2024, GlorySec initiated #OPVenezuela, urging the Venezuelan people to stand up against Maduro. They announced the lawful seizure of over 50 Venezuelan websites containing illegal content and support for Maduro's socialist ideas. GlorySec promised to continue their efforts to help the Venezuelan people achieve freedom. [of Nehlo Venezuela] [Venezuela after being Seized][53][54][55][56][57]

Operation Against Venezuela (Update)

[edit]

On May 28th, 2024, GlorySec issued a correction regarding their previous operation, #OPVenezuela. They acknowledged that they had not initially seized the website tuticketvenezuela.com and provided the following update [of tuticketvenezuela][58][59]

On May 29th, 2024, GlorySec celebrated the impact of their actions in Venezuela, highlighting a tweet as proof of their influence [Tweet][60]

They reaffirmed their commitment to helping the Venezuelan people, criticizing Maduro's regime and promoting their vision for Venezuela’s future:

Positions: No to Socialism No to Communism No to Dictatorship Yes to Capitalism Yes to Minarchism GlorySec urged Venezuelans to choose economic growth and freedom over continued support for Maduro, contrasting their vision with alleged influence from Russian oligarchs.

GlorySec re-focuses its efforts

[edit]

June 4, 2024 GlorySec is re-focusing efforts on Russia while continuing operations in Venezuela and against Indonesian hackers. They are also considering expanding their election cycle to three months and possibly introducing political parties within the group. Future plans include joining the #OPDrugWar and focusing on meaningful updates.[61][62][63]

GlorySec Deploys WORM type malware to Venezuela

[edit]

June 7, 2024 GlorySec has deployed worm-type malware in Venezuela, affecting 100 companies and gaining access to personal PCs. They have shared proof of their actions and emphasized their focus on aiding Venezuelan people while avoiding harm to civilians.[64][65][66][67][68][69]

GlorySec Deploys WORM type malware to Venezuela (UPDATE)

[edit]

June 11, 2024 GlorySec assured the Venezuelan population that they have not monitored innocent devices. They posted screenshots from compromised Venezuelan companies, ensuring no civilian data was accessed.[70][69][71][72][38][73][70]

July 29, 2024 GlorySec released a flag depicting the Venezuelan flag in Anarcho-Capitalist aspects[74]

GlorySec attacks PRC

[edit]

June 13, 2024 OPPRC launched against the PRC, claiming access to 20,000 Communist Chinese company systems. GlorySec defends Taipei and opposes Maoist China, with ongoing operations to deface Chinese websites. GlorySec[75]

June 14, 2024 GlorySec retaliates for the FortiGate breach with attacks on 20,000 Chinese systems, escalating the cyberwar.[76][77]

GlorySec Third Elections

[edit]

June 18, 2024 Upcoming GlorySec Presidential Elections:

Charon Retract Charon Greed Charon Debug [78]

June 23, 2024 Charon Greed is elected President. Future elections may transition to an annual cycle.[79]

GlorySec continues operating in China

[edit]

June 27, 2024 GlorySec has seized NetMarvel and continues actions against Chinese infrastructure, with a warning for Chinese and Muslim hackers to align with their interests or face consequences. [China Website][80][81][8]

GlorySec Responds to Russia Bombing a Childrens Cancer Hospital in Ukraine

[edit]

July 11, 2024 In response to Russia's bombing of a Ukrainian children's hospital, GlorySec has hacked the Russian Ministry of Health and seized Russian healthcare websites, leaking around 20 Gigabytes.[34][82]

July 14, 2024 GlorySec continues actions against Russian healthcare data, focusing on government data and exposing corrupt practices.[83]

GlorySec Fourth Elections

[edit]

July 19, 2024 4th Presidential Elections:

Charon Wheezy Charon Debug Charon Retract [84] July 29, 2024 Charon Wheezy is elected President. GlorySec emphasizes support for Anarcho-capitalism and opposition to oppressive regimes. They encourage Venezuelans to continue their fight against Maduro, declaring a revolution.[85][86][87]

July 30, 2024 GlorySec declares the success of their Venezuelan operations and warns Cuban and Nicaraguan governments of future actions.[88]

See Also

[edit]

References

[edit]
  1. ^ "GlorySec Twitter Replies". X/Twitter. Retrieved 2024-08-01.
  2. ^ CyberShafarat, Treadstone (2023-09-09). "GlorySec hits National Bank of Pakistan". CyberShafarat. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  3. ^ Luiz, Steel (2023-09-10). "Glorysec Makes Conduct Breached Pakistan National Bank, Carts 1.7GB Data". CyberTecWiz. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  4. ^ "GlorySec". Retrieved 2024-08-01.
  5. ^ CyberShafarat, Treadstone (2023-09-14). "Parliament of Pakistan Dropped". CyberShafarat. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  6. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  7. ^ "CyberKnow reporting Glorysec has officially joined the pro-ukraine hacktivist fight against Russia". X/Twitter. Retrieved 2024-08-01.
  8. ^ a b "GlorySec". Telegram. Retrieved 2024-08-01.
  9. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  10. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  11. ^ CyberShafarat, Treadstone (2023-11-30). "PCBS, Palestinian state media, hacked". CyberShafarat. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  12. ^ "Daily Dark Web reporting GlorySec allegedly hacked PCBS, Palestinian state media". X/Twitter. Retrieved 2024-08-01.
  13. ^ "Socradar reporting on the attack". Socradar. Retrieved 2024-08-01.
  14. ^ "Cyfirma Interviewing GlorySec on the attack". Cyfirma. Retrieved 2024-08-01.
  15. ^ "Darkowl reporting The group GlorySec posted on Telegram that they considered a firewall on Palestinian websites, indicated Palestine had prepared well in advance for a conflict in the cyber realm as well as the physical realm. They also said they'd release the data right to Israel to support their operations and encouraged them to investigate this. It is unclear what information they had or if this was shared". Darkowl. Retrieved 2024-08-01.
  16. ^ "Daily Dark Web reporting GlorySec has announced that the group will resume its old schedule, targeting those who support Palestine". X/Twitter. Retrieved 2024-08-01.
  17. ^ "Daily Dark Web reporting GlorySec has issued a statement regarding Israel-Palestine conflict, recommending Israeli Cyber Defense and Mossad to take a look at Palestinian websites". X/Twitter. Retrieved 2024-08-01.
  18. ^ "Cyfirma reporting on the attack". Cyfirma. Retrieved 2024-08-01.
  19. ^ "Cyfirma adding GlorySec to cybertrackers and reporting more of the attacks". Cyfirma. Retrieved 2024-08-01.
  20. ^ "GlorySec added to IsraelVSHamas cybertracker". IsraelVSHamas. Retrieved 2024-08-01.
  21. ^ "SecurityHQ reporting on GlorySec and adding it to its cybertracker". SecurityHQ. Retrieved 2024-08-01.
  22. ^ "SOCRadar reporting on firewall report by GlorySec in Palestine". SOCRadar. Retrieved 2024-08-01.
  23. ^ "Roundup including GlorySec operations". Linkedin. Retrieved 2024-08-01.
  24. ^ CyberShafarat, Treadstone (2024-04-27). "GlorySec Redux #OpIran". CyberShafarat. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  25. ^ "CyberShafarat reporting on GlorySec OPTerrorism". CyberShafarat. Archived from the original on 2024-07-31. Retrieved 2024-08-01.
  26. ^ "Webarchive of CyberShafarat reporting GlorySec conducts OPIran". CyberShafarat. Retrieved 2024-08-01.
  27. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  28. ^ "GlorySA". Telegram. Retrieved 2024-08-01.
  29. ^ "Breachforums post of the data". Breachforums. Retrieved 2024-08-01.
  30. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  31. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  32. ^ "CyberKnow reports Glorysec has declared that they will conduct cyber activity against Indonesia and Bangladesh if those two countries don't deal with the large volume of hacktivist groups that claim to operate from their respective locations". X/Twitter. Retrieved 2024-08-01.
  33. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  34. ^ a b "GlorySec". Telegram. Retrieved 2024-08-01.
  35. ^ a b "GlorySec". Telegram. Retrieved 2024-08-01.
  36. ^ a b "CyberShafarat reports GlorySec targets Venezuela". CyberShafarat. Retrieved 2024-08-01.
  37. ^ "Venarix reports GlorySec hacktivist group has reportedly launched a series of web defacement attacks targeting companies in Venezuela, spotlighting the nation's crisis under President Nicolás Maduro". X/Twitter. Retrieved 2024-08-01.
  38. ^ a b "ForesieTFeed reports Notorious threat group GlorySec infiltrates Kingbike Venezuela, leaking 407K+ lines of primary database files via WORM malware. This breach underlines the need for robust cybersecurity measures". X/Twitter. Retrieved 2024-08-01.
  39. ^ "Webarchive of cybershafarat reporting Huge claim: First hacktivist group with access to nuclear weapons". CyberShafarat. Retrieved 2024-08-01.
  40. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  41. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  42. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  43. ^ "Cipher PDF reports that GlorySec has announced via their Telegram channel that they have managed to breach the systems of the Central Bank of Venezuela and the United Socialist Party of Venezuela" (PDF). Cipher. Retrieved 2024-08-01.
  44. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  45. ^ "MITRE Doggy reports GlorySec and Indonesian Hackers: Conflict and Competition in Cyberspace". Medium. Retrieved 2024-08-01.
  46. ^ "Daily Dark Web reports GlorySec Announced to Expose Indonesian Hackers and Collaborate with Indian Hacktivists". X/Twitter. Retrieved 2024-08-01.
  47. ^ "Daily Dark Web reports GlorySec has declared its intention to publish information on every Indonesian hacker attempting to infiltrate Western cyberspace". DDW. Retrieved 2024-08-01.
  48. ^ "Cybershafarat reports GlorySec targets Indonesia". CyberShafarat. Retrieved 2024-08-01.
  49. ^ "IndoLorebook". Telegram. Retrieved 2024-08-01.
  50. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  51. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  52. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  53. ^ "BlueteamSecops reports Atentos en Venezuela 50 sitios afectados por el grupo hactivista GlorySec". X/Twitter. Retrieved 2024-08-01.
  54. ^ "GlorySec Twitter". X/Twitter. Retrieved 2024-08-01.
  55. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  56. ^ "Daily Dark Web reports Hacktivist Group GlorySec Targets Venezuelan Websites". X/Twitter. Retrieved 2024-08-01.
  57. ^ "Daily Dark Web reports In a move against the Venezuelan government and its support for socialism under President Maduro, the hacktivist group GlorySec has announced the seizure of over 50 Venezuelan websites". DDW. Retrieved 2024-08-01.
  58. ^ "Daily Dark Web reports GlorySec allegedly conducted a defacement attack on TuTicketVenezuela". X/Twitter. Retrieved 2024-08-01.
  59. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  60. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  61. ^ "Daily Dark Web reports The hacker group GlorySec announced a significant strategic shift in their operations, refocusing their primary efforts on Russia". X/Twitter. Retrieved 2024-08-01.
  62. ^ "Daily Dark Web reports In a recent statement, the hacker group GlorySec announced a significant strategic shift in their operations, refocusing their primary efforts on Russia". DDW. Retrieved 2024-08-01.
  63. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  64. ^ "Daily Dark Web reports GlorySec Launches Malware Attack in Venezuela and Hints at Future Operations in Russia". X/Twitter. Retrieved 2024-08-01.
  65. ^ "Daily Dark Web reports In a alarming incident, the hacker group GlorySec has revealed their latest cyber operation, targeting companies in Guyana City". DDW. Retrieved 2024-08-01.
  66. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  67. ^ "BlueteamSecops reports Evidencia del ataque de GlorySec en Venezuela". X/Twitter. Retrieved 2024-08-01.
  68. ^ "GlorySec Twitter". X/Twitter. Retrieved 2024-08-01.
  69. ^ a b "GlorySec". Telegram. Retrieved 2024-08-01.
  70. ^ a b "GlorySec". Telegram. Retrieved 2024-08-01.
  71. ^ "CyberShafarat reports GlorySec Airdropped WORM type malware usb sticks in Venezuela Guyana city". CyberShafarat. Retrieved 2024-08-01.
  72. ^ "Treadstone reports GlorySec airdropped worm-type malware USB sticks in Venezuela Guyana City". X/Twitter. Retrieved 2024-08-01.
  73. ^ "MonThreat reports Worm-type Malware Allegedly Distributed via USB to More Than 100 Companies". X/Twitter. Retrieved 2024-08-01.
  74. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  75. ^ "MonThreat reports Alleged Access to Admin Panels of Chinese Sites with 0day". X/Twitter. Retrieved 2024-08-01.
  76. ^ "FalconFeedsio reports GlorySec claims to target China". X/Twitter. Retrieved 2024-08-01.
  77. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  78. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  79. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  80. ^ "Daily Dark Web GlorySec targets China under OPChina claims seizure of netmarvel". DDW. Retrieved 2024-08-01.
  81. ^ "Daily Dark Web GlorySec Targets China". X/Twitter. Retrieved 2024-08-01.
  82. ^ "Cyberknow reports Glorysec has responded to Russia's missile strike on a Ukraine children's hospital with a claimed data breach of Russian medical data". X/Twitter. Retrieved 2024-08-01.
  83. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  84. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  85. ^ "GlorySec". Telegram. Retrieved 2024-08-01.
  86. ^ "WhiteHunters Saludos de Charon Wheezy". X/Twitter. Retrieved 2024-08-01.
  87. ^ "GlorySec Twitter". X/Twitter. Retrieved 2024-08-01.
  88. ^ "GlorySec". Telegram. Retrieved 2024-08-01.

Further reading

[edit]


Category:Hacker groups Category:Hacking in the 2020s Category:Hacktivists Category:Minarchism Category:Anarcho-capitalism Category:Activism Category:Organizations established in 2023 Category:Internet-based activism Category:Anarcho-capitalist organizations