OpKillingBay is a yearly hacktivism operation by Anonymous, activists and other organizations in response to the hunting of whales and dolphins in Japan and Denmark. This year’s denial-of-service (DoS) attacks began in early September with an uptick in attacks in October following a TweetStorm earlier in the month.
This year OpKillingBay featured a two front campaign: one for Japan and the hunting of dolphins and the other for Denmark and the hunting of whales. Each campaign featured their own website and information regarding each operation. The Denmark operations are distinguished from the Japanese operations with the hashtag #OpKillingBay #EU.
"Whaling was outlawed in 1986 by the International Whaling Commission, but dolphin hunts remain legal, The Must be change #OpKillingBay"
Anonymous organizers prepare content for TweetStorms, videos, target lists and websites. The OpKillingBay website for Japan this year featured pre-scripted tweets that included @mentions, hashtags and images for each tweet. They also provided pre-scripted tweets for the TweetStorm in English, Japanese, Dutch, French, German, and Spanish. In addition, they provided scripted tweets designed to call out sponsors of the upcoming Olympics in Japan.
Operation Websites:
Each operation also provided their own target list for other hacktivists to attack.
Savn.fo was targeted after it was discovered to be used to track whales
This year the attackers behind OpKillingBay targeted a wide variety of industries on both fronts of the operation.
Industries:
- Transportation
- Retail
- Banks
- Government
- Media
- Tourism
- Worker Union's
A single hacker that goes by the handle RektFaggot has attacked over 28 targets from Denmark to Japan since the beginning of September. Rekt has been one of the main hacktivist for OpKillingBay. The hacker has provided target lists, scan reports, data dumps and directly attacked victims. In addition to OpKillingBay, Rekt has also engaged in OpSeaWorld, OpWhales and OpFunKill.
OpKillingBay: 28+ Sites attacked by Rekt since the beginning of September
- unyuroren.or.jp
- Town.koya.wakayama.jp
- town.kudoyama.wakayama.jp
- town.taiji.wakayama.jp
- town.taiji.lg.jp
- cypress.ne.jp
- whaling.jp
- plala.or.jp
- japanpost.jp
- jnto.go.jp
- narita-airport.jp
- centrair.jp
- the-japan-news.com
- ascii.jp
- smyrilline.dk
- savn.fo
- lindin.fo
- faroeislands.fo
- chw.jp
- city.iwade.lg.jp
- drekin.fo
- elektron.fo
- borg.fo
- shimoda-aquarium.com
- aburatsubo.co.jp
- marine-world.co.jp
- ven.fo
- sif.fo
OpSeaWorld: 11+ Sites attacked by Rekt since the beginning of September
- Sochiaquarium.ru
- Marineland.fr
- Georgiaaquarium.org
- Zoo.pt
- Tiergarten.nuernberg.de
- Gulfarium.com
- Bodrumdolphinpark.com
- Dolphin-academy.com
- Dlfinarium.nl
- Curacaodolphntheraphy.com
- Mundomar.es
OpWhales: 1 Site attacked by Rekt since the beginning of September
OpFunKill: 2 Sites attacked by Rekt since the beginning of September
- Denmark.dk
- Gordonramsay.com
In this series of attacks, we have seen SQL injections, data dumps and service outages cause by denial-of-service attacks from ongoing campaigns by Anonymous. OpKillingBay has targeted a number of industries directly and indirectly related to the hunting of dolphins and whales. Attacks like these are hard to avoid. At the core of the problem are ideological differences. The victims of these attacks are conducting business within the letter of the law. The actions of the groups behind OpKillingBay are driven from an emotional and social justice perspective. These two sides may never see eye to eye and this could result in a persistent state of attacks.
These attacks aim to cause service outages due to vulnerabilities in server applications or a large amount of traffic aimed at a weak network. Radware offers a full range of solutions to help your network properly mitigate attacks like the ones seen during OpKillingBay. Our DefensePro system can help provide your network with real-time behavioral based attack mitigation. Our Attack Mitigation Services (AMS) can also aid in detection and mitigation with cloud based volumetric attack scrubbing.
In addition to Radware products, it is recommended that you review your network once a year during the month of August. These attacks happen yearly before the start of the fishing season in September. Maintaining and inspecting your network is necessary if you are facing yearly attacks from hacktivists like those involved with OpKillingBay.
For more Information about this alert visit: http://global.radware.com/LP=242
Reports
Sources