Cyber Escalation in Southeast Asia: AnonSecKh Targets Thailand


June 16, 2025 03:08 PM

An incident at the border area between Thailand and Cambodia triggered a hacktivist-led cyber campaign targeting Thai organizations and institutions.

Download now

Key Attack Insights:

  • Following the unfortunate passing of a Cambodian soldier after an incident with Thai soldiers on the border between both countries, the number of cyberattacks on Thailand has increased significantly.
  • AnonSecKh (aka ANON-KH, aka Bl4ckCyb3r) is a recent hacktivist group that first claimed an attack on their Telegram channel on March 23, 2025.
  • AnonSecKh leverages proof-of-impact reports to claim distributed denial of service (DDoS) attacks via its Telegram channel(s).
  • AnonSecKh claimed 73 attacks against Thai organizations between May 28 and June 10, 2025.
  • AnonSecKh primarily targets government and large, highly visible, Thai organizations.
  • AnonSecKh's campaign is mainly political driven, and they target countries that have harmed Cambodia.

An incident at the border area between Thailand and Cambodia triggered a hacktivist-led cyber campaign targeting Thai organizations and institutions.

Cyber incidents in the region are not uncommon. In the past, politically motivated Cambodian hacktivist groups, such as ANONSECKH, H3C4KEDZ, and NXBBSEC, have launched attacks in response to rising border tensions or nationalistic disputes.

Figure 1: Number of claimed attacks per month targeting Thailand in 2025 (source: Radware)

Figure 1: Number of claimed attacks per month targeting Thailand in 2025 (source: Radware)

AnonSecKh (Bl4ckCyb3r)

AnonSecKh, also going by the name of Bl4ckCyb3r on Telegram, first targeted Thailand’s official government portals on March 23. By the end of March, they claimed attacks on more Thai government, academic and commercial websites. April was a slow month for the threat group, but by the end of the month, AnonSecKh targeted multiple financial institutes in Vietnam (you can read about the rise of these attacks here).

A turning point occurred on May 28, following the incident with the Cambodian soldier. From that moment, AnonSecKh’s activity escalated dramatically.

Figure 2: Message from AnonSecKh’s Telegram on May 28

Figure 2: Message from AnonSecKh’s Telegram on May 28

Between May 1 and May 27, only 20 attack claims targeting Thailand were observed, but between May 28 and June 10, the number of claimed attacks jumped to a staggering 64 (as seen on Figure 3).

Figure 3: Number of claimed attacks: May 1 – May 27 and May 28th – June 10th (source: Radware)

Figure 3: Number of claimed attacks: May 1 – May 27 and May 28th – June 10th (source: Radware)

The attacks between May 28 and June 10 targeted multiple industries, with government websites being the most heavily targeted and representing almost 30% of all attack claims, followed by military (almost 26%), manufacturing (almost 15%) and finance (more than 7%). In early June, there was a brief slowdown with only a few isolated incidents. However, following the strong public statement from the Thai military on June 6, AnonSecKh resumed and scaled up its attacks, continuing its campaign against Thai institutions and showing no intention of slowing down at the time of writing.

Figure 4: Top verticals impacted May 28 – June 10 (source: Radware)

Figure 4: Top verticals impacted May 28 – June 10 (source: Radware)

Reasons for Concern

AnonSecKh’s activity highlights several key risks. First, their attacks are tightly linked to political incidents and demonstrate a reactive pattern. This suggests that even isolated or symbolic events can trigger immediate cyber responses.

Second, the group has shown the ability to launch rapid and intense attack waves. The sharp jump in volume following key events reflects a high level of coordination and intent.

Finally, the choice of targets such as government resources, universities and financial institutions raises concerns about potential real-world disruptions. These attacks aren’t just aimed at making a statement, they are an attempt at damaging public trust and interfering with essential services.

Threat Alert

Want to read the complete threat alert?

Download it for free right now.

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia