Source: Newarklifemagazine

Forescout: Forescout Announces Rise in State-Sponsored Hacktivism

Noname057(16) Behind 90% of State-Aligned Cyberattacks in 2024 Noname057(16) Behind 90% of State-Aligned Cyberattacks in 2024 SAN FRANCISCO --(BUSINESS WIRE) SAN FRANCISCO --(BUSINESS WIRE) RSA Conference - Forescout Technologies Inc. , a global cybersecurity leader, today released a new report, " The Rise of State-Sponsored Hacktivism ," analyzing the escalation of hacktivist attacks in 2024 and providing predictions for 2025. The report reveals that four state-aligned hacktivist groups operating on opposing sides of the Russia-Ukraine and Israel-Palestine conflicts - BlackJack, Handala Group, Indian Cyber Force, and NoName057(16) - claimed responsibility for 780 attacks in 2024 alone. Many of these targeted critical infrastructure sectors such as government services, transportation systems, and financial institutions. RSA Conference - Forescout Technologies Inc. , a global cybersecurity leader, today released a new report, " The Rise of State-Sponsored Hacktivism ," analyzing the escalation of hacktivist attacks in 2024 and providing predictions for 2025. The report reveals that four state-aligned hacktivist groups operating on opposing sides of the Russia-Ukraine and Israel-Palestine conflicts - BlackJack, Handala Group, Indian Cyber Force, and NoName057(16) - claimed responsibility for 780 attacks in 2024 alone. Many of these targeted critical infrastructure sectors such as government services, transportation systems, and financial institutions. Modern hacktivism expanded from hacking for ideological causes to aiding warfare. Today's hacktivists frequently target adversarial critical infrastructure to advance the strategic objectives of nation-states. This transformation has blurred the lines between traditional hacktivism and state-sponsored cyber operations, making it increasingly difficult to distinguish between independent activists and proxy actors working on behalf of governments. Modern hacktivism expanded from hacking for ideological causes to aiding warfare. Today's hacktivists frequently target adversarial critical infrastructure to advance the strategic objectives of nation-states. This transformation has blurred the lines between traditional hacktivism and state-sponsored cyber operations, making it increasingly difficult to distinguish between independent activists and proxy actors working on behalf of governments. "Nation-state conflicts have given rise to a new kind of threat: hacktivist proxies launching damaging cyberattacks," said Barry Mainz, CEO of Forescout. "This isn't a future risk - it's already happening, and we're seeing escalating attacks on critical infrastructure and commercial networks worldwide. As geopolitical tensions rise, organizations must act now to close every gap and take control of their attack surface before it's used against them." "Nation-state conflicts have given rise to a new kind of threat: hacktivist proxies launching damaging cyberattacks," said Barry Mainz, CEO of Forescout. "This isn't a future risk - it's already happening, and we're seeing escalating attacks on critical infrastructure and commercial networks worldwide. As geopolitical tensions rise, organizations must act now to close every gap and take control of their attack surface before it's used against them." Most Active Hacktivist Group was NoName057(16) Most Active Hacktivist Group was NoName057(16) NoName057(16), a Russian-aligned group, was by far the most active group, accounting for 90% of attacks analyzed, primarily through large-scale DDoS campaigns targeting the websites of organizations in Ukraine and countries that support Ukraine. BlackJack (1%), Handala Group (8%), and the Indian Cyber Force (1%) accounted for the remaining attacks. NoName057(16), a Russian-aligned group, was by far the most active group, accounting for 90% of attacks analyzed, primarily through large-scale DDoS campaigns targeting the websites of organizations in Ukraine and countries that support Ukraine. BlackJack (1%), Handala Group (8%), and the Indian Cyber Force (1%) accounted for the remaining attacks. Hacktivists Attacks Spanned 40 Countries; Ukraine Was Most Targeted Hacktivists Attacks Spanned 40 Countries; Ukraine Was Most Targeted Ukraine (141 attacks), Israel (80), and Spain (64) were the most frequently targeted countries 82% of attacks targeted Europe, while 18% targeted Asia including the Middle East Less than 1% of attacks impacted organizations in the Americas Ukraine (141 attacks), Israel (80), and Spain (64) were the most frequently targeted countries 82% of attacks targeted Europe, while 18% targeted Asia including the Middle East Less than 1% of attacks impacted organizations in the Americas Critical Infrastructure Remains Prime Target Critical Infrastructure Remains Prime Target 44 attacks targeted government entities, including military services 21% of attacks focused on the transportation and logistics sector, with key targets including ports, airports, roads, railways, and urban transportation systems 13% disrupted financial services, including banks, payment systems, and other financial infrastructure 44 attacks targeted government entities, including military services 21% of attacks focused on the transportation and logistics sector, with key targets including ports, airports, roads, railways, and urban transportation systems 13% disrupted financial services, including banks, payment systems, and other financial infrastructure "Criminal hacktivist groups will continue to escalate disruptive cyberattacks, particularly against countries involved in conflict or those supporting their adversaries," said Daniel dos Santos, Head of Research at Forescout Research - Vedere Labs. "We expect them to prioritize industries that impact daily life, such as government services and financial institutions. While DDoS and data theft remain common, OT and IoT vulnerabilities will be increasingly exploited to cause deeper operational disruptions. It's more important now than ever to harden defenses and improve visibility across IT and OT environments." "Criminal hacktivist groups will continue to escalate disruptive cyberattacks, particularly against countries involved in conflict or those supporting their adversaries," said Daniel dos Santos, Head of Research at Forescout Research - Vedere Labs. "We expect them to prioritize industries that impact daily life, such as government services and financial institutions. While DDoS and data theft remain common, OT and IoT vulnerabilities will be increasingly exploited to cause deeper operational disruptions. It's more important now than ever to harden defenses and improve visibility across IT and OT environments." For more information, review the review the full research report , blog and join the webinar . For more information, review the review the full research report , blog and join the webinar . About Forescout About Forescout For more than 20 years, Fortune 100 organizations, government agencies, and large enterprises have trusted Forescout as their foundation to manage cyber risk, ensure compliance, and mitigate threats. The Forescout 4D Platform delivers comprehensive asset intelligence, continuous assessment, and ongoing control over all managed and unmanaged, agented and un-agentable assets across IT, OT, IoT, and IoMT environments. Forescout's open platform makes every cybersecurity investment more effective with seamless data integrations and automated workflow orchestration across more than 100 security and IT products. For more than 20 years, Fortune 100 organizations, government agencies, and large enterprises have trusted Forescout as their foundation to manage cyber risk, ensure compliance, and mitigate threats. The Forescout 4D Platform delivers comprehensive asset intelligence, continuous assessment, and ongoing control over all managed and unmanaged, agented and un-agentable assets across IT, OT, IoT, and IoMT environments. Forescout's open platform makes every cybersecurity investment more effective with seamless data integrations and automated workflow orchestration across more than 100 security and IT products. Forescout Research - Vedere Labs is the industry leader in device intelligence, curating unique and proprietary threat intelligence that powers Forescout's platform. Forescout Research - Vedere Labs is the industry leader in device intelligence, curating unique and proprietary threat intelligence that powers Forescout's platform. View source version on businesswire.com: https://www.businesswire.com/news/home/20250429326220/en/ View source version on businesswire.com: https://www.businesswire.com/news/home/20250429326220/en/ Media Contacts: RH Strategic for Forescout forescoutpr@rhstrategic.com Forescout Communications press@forescout.com Media Contacts: RH Strategic for Forescout forescoutpr@rhstrategic.com Forescout Communications press@forescout.com Copyright Business Wire 2025 Copyright Business Wire 2025 Information contained on this page is provided by an independent third-party content provider. XPRMedia and this Site make no warranties or representations in connection therewith. If you are affiliated with this page and would like it removed please contact pressreleases@xpr.media Information contained on this page is provided by an independent third-party content provider. XPRMedia and this Site make no warranties or representations in connection therewith. If you are affiliated with this page and would like it removed please contact pressreleases@xpr.media

Read full article »
Est. Annual Revenue
$100-500M
Est. Employees
1.0-5.0K
Barry Mainz's photo - CEO of Forescout

CEO

Barry Mainz

CEO Approval Rating

63/100

Read more