Há hacktivismo real? Um Método para Distinguir Operações de Falsa Bandeira de Hacktivistas Genuínos

Autores

DOI:

https://doi.org/10.26792/rbed.v12i1.75460

Palavras-chave:

Hacktivismo, Operações de falsa bandeira, Segurança Cibernética, Ameaças Híbridas

Resumo

O hacktivismo tem sido um fenômeno persistente, embora em constante evolução, desde o advento da internet. Enquanto as ações hacktivistas iniciais eram amplamente simbólicas, os anos 2000 testemunharam o surgimento de campanhas mais impactantes. Contudo, à medida que essas atividades ganharam visibilidade, atores patrocinados pelo Estado começaram a adotar táticas de false-flag — imitando o hacktivismo para ocultar o envolvimento estatal em operações cibernéticas, explorando públicos devido ao seu objetivo político “puro”. Em um mundo politicamente polarizado, distinguir movimentos políticos genuínos de interferência estrangeira torna-se relevante. Este artigo examina a distinção entre o hacktivismo genuíno e as operações de false-flag apoiadas por Estados, analisando 24 casos notáveis. Por meio de uma abordagem comparativa, estabelece uma metodologia para diferenciar atividades hacktivistas autênticas de ações estatais estrategicamente disfarçadas. A análise identifica quatro indicadores-chave: (i) a longevidade e continuidade das atividades de um grupo; (ii) a seleção e justificativa dos alvos; (iii) a sofisticação dos métodos de ataque empregados; e (iv) a
manipulação de informações vazadas para servir a interesses estatais.

Downloads

Não há dados estatísticos.

Biografia do Autor

Eduardo Izycki, Universidade de Brasília (UnB)

é Doutorando em Relações Internacionais na Universidade de Brasília (UnB). É professor no IDP, Brasília, DF, Brasil. Lidera um grupo de pesquisa em Cibersegurança no Grupo de Estudos e Pesquisa em Segurança Internacional do Instituto de Relações Internacionais da Universidade de Brasília — Gepsi UnB. Orcid.org/0000-0001-9514-7723. E-mail: eduardo.izycki@aluno.unb

Luiz Gustavo Lavandoski da Silva, Universidade Federal do ABC (UFABC)

é Doutorando em Economia Política Mundial pela Universidade Federal do ABC (UFABC). Atua como analista e pesquisador de segurança cibernética no setor privado em São Paulo, SP, Brasil. Membro do Grupo de Estudos e Pesquisa em Segurança Internacional do Instituto de Relações Internacionais da Universidade de Brasília (GEPSI-UnB) e do Instituto de Defesa Cibernética (IDCIBER).

 

Referências

ANSSI. 2015. “Attaque Informatique Contre TV5 Monde: L’ANSSI Mobilisée”.cyber.gouv.fr/publications/attaque-informatique-contre-tv5-monde-lanssi-mobi-lisee.

ANSSI. 2017. “Retour Technique de l’incident de TV5Monde”. www.sstic.org/2017/presentation/2017_cloture/.

Antoniuk, Daryna. 2023. “Report Claims to Reveal Identity of Russian Hacktivist Leader”. The Record. therecord.media/killmilk-identity-revealed-gazeta-ru-kill-net-russia.

Antoniuk, Daryna. 2024. “How the Belarusian Cyber Partisans Are Fighting a Digital War against Two Dictators”. The Record. therecord.media/belarusian-cyber-partisans-operations-politics-russia-ukraine.

Autenrieth, A. and A. Kirstädter. 2000. “Fault Tolerance and Resilience Issues in IP-Based Networks”. www.semanticscholar.org/paper/Fault-Tolerance-and-Resilience-Issues-in-IP-Based-Autenrieth-Kirst%C3%A4dter/f44807ada8b-

61cdbd4293b79187721137c3233da.

Backchannel and Aaron DeVera. 2021. “AgainstTheWest, the Hacking Group Wreaking Havoc on Chinese Government and Corporate Targets”. Substack newsletter. Backchannel Blog (December). backchannel.substack.com/p/against-thewest-the-hacking-group.

Barlow, John Perry. 2016. “A Declaration of the Independence of Cyberspace”. Electronic Frontier Foundation (January). www.eff.org/cyberspace-independence.

BBC. 2012. “Shamoon Virus Targets Energy Sector Infrastructure”. Technology.

BBC News (August). www.bbc.com/news/technology-19293797.

Beckerman, Carly E. 2022. “Is There a Cyber Security Dilemma?” Journal of Cybersecurity 8, no. 1: tyac012. doi.org/10.1093/cybsec/tyac012. DOI: https://doi.org/10.1093/cybsec/tyac012

Beraldo, Davide. 2022. “Movements as Multiplicities and Contentious Branding: Lessons from the Digital Exploration of #Occupy and #Anonymous”. Information, Communication & Society 25, no. 8: 1098–114. doi.org/10.1080/1369118X.2020.1847164. DOI: https://doi.org/10.1080/1369118X.2020.1847164

Blumenthal, Erin. 2021. “Hezbollah’s al-Qard al-Hasan and Lebanon’s Banking Sector”. FDD (May). www.fdd.org/analysis/2021/05/11/hezbollahs-al-qard-al-hasan-and-lebanons-banking-sector/.

Bronk, Christopher and Eneken Tikk-Ringas. 2013. “The Cyber Attack on Saudi Aramco”. Survival 55, no. 2: 81–96. doi.org/10.1080/00396338.2013.784468. DOI: https://doi.org/10.1080/00396338.2013.784468

Brown, Rebekah. 2017. “The Shadow Brokers Leaked Exploits Explained”. Rapid7 (April). www.rapid7.com/blog/post/2017/04/18/the-shadow-brokers-leaked-exploits-faq/.

Burton, Joe and Clare Lain. 2020. “Desecuritising Cybersecurity: Towards a Societal Approach”. Journal of Cyber Policy 5, no. 3: 449–70. doi.org/10.1080/23738871.2020.1856903. DOI: https://doi.org/10.1080/23738871.2020.1856903

Chertoff, Michael. 2017. “A public policy perspective of the Dark Web”. Journal of Cyber Policy 2, no. 1: 26–38. doi.org/10.1080/23738871.2017.1298643. DOI: https://doi.org/10.1080/23738871.2017.1298643

CISA. 2022a. “Iranian State Actors Conduct Cyber Operations Against the Government of Albania” (September). www.cisa.gov/news-events/cyberse-curity-advisories/aa22-264a.

CISA. 2022b. “Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure” (May). www.cisa.gov/news-events/cybersecurity-advisories/aa-22-110a.

Coleman, E. Gabriella. 2017. “The Public Interest Hack”. Limn 8 (May): 18.

Coleman, Gabriella. 2013. “Anonymous and the Politics of Leaking”. In Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society, edited by Benedetta Brevini, Arne Hintz, and Patrick McCurdy. Palgrave Macmillan UK. doi.org/10.1057/9781137275745_13.

Coleman, Gabriella. 2014a. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso. www.versobooks.com/en-gb/products/21-hacker-hoaxer-whistleblower-spy.

Coleman, Gabriella. 2014b. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso. www.versobooks.com/en-gb/products/21-hacker-hoaxer-whistleblower-spy.

Cordesman, Anthony H. 2016. The Changing Gulf Balance and the Iranian Threat (August). www.csis.org/analysis/changing-gulf-balance-and-iranian-threat.

Cox, Joseph. 2018. “Meet ‘Intrusion Truth’, the Mysterious Group Doxing Chinese Intel Hackers”. VICE (August). www.vice.com/en/article/intrusion-tru-th-group-doxing-hackers-chinese-intelligence/.

Cristiano, Fabio, Xymena Kurowska, Tim Stevens, et al. 2023. “Cybersecurity and the Politics of Knowledge Production: Towards a Reflexive Practice.” Journal of Cyber Policy 8, no. 3: 331–64. doi.org/10.1080/23738871.2023.2287687. DOI: https://doi.org/10.1080/23738871.2023.2287687

CrowdStrike. 2020. “CrowdStrike’s Work with the Democratic National Committee: Setting the Record Straight”. www.crowdstrike.com/en-us/blog/bears-midst-intrusion-democratic-national-committee/.

CyberPartisans. 2025. “Belarusian Cyber Partisans”. www.by.cpartisans.org/en.

Cylance. 2014. “Operation Cleaver”. www.aclu.org/sites/default/files/field_do-cument/Cylance-Operation-Cleaver-Report-1748-1833.pdf.

DataBreaches.Net. 2022. “An Interview with AgainstTheWest”. databreaches.net/2022/04/03/an-interview-with-againstthewest/.

Defense Intelligence Agency. 2017. Russia Military Power: Building a Military to Support Great Power Aspirations.” publicintelligence.net/dia-russia-military-po-wer-2017/.

Deibert, Ronald. 2011. “Syrian Electronic Army: Disruptive Attacks and Hyped Targets” (June). deibert.citizenlab.ca/2011/06/syrian-electronic-army-disrupti-ve-attacks-and-hyped-targets/.

Denning, D. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet As a Tool for Influencing Foreign Policy”. www.semanticscholar.org/paper/Activism,-Hacktivism,-and-Cyberterrorism:-the-As-a-Denning/829b21633c51252429abcb

1ac717ecc4efc64566.

Dreyfuss, Suelette. 1997. Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier. Mandarin Australia.

Egloff, Florian J. 2015. “Cybersecurity and the Age of Privateering: A Historical Analogy”. www.semanticscholar.org/paper/Cybersecurity-and-the-Age-of-Privateering%3A-AEgloff/dd21875046c939b63afa704d6b4c5c26edf80401.

FireEye. 2017. “APT28 At the Center of the Storm”.

Fisher, Phineas. 2014. “Hackback — A DIY GUIDE II”. The Anarchist Library. theanarchistlibrary.org/library/phineas-fisher-hackback-a-diy-guide-ii.

Fisher, Phineas. 2016. “Hackback — A DIY GUIDE 1”. The Anarchist Library. theanarchistlibrary.org/library/phineas-fisher-hackback-a-diy-guide-i.

Fisher, Phineas. 2017. “Hack Back — A DIY Guide (Hacking Team)”. The Anarchist Library theanarchistlibrary.org/library/hack-back-subcowmandante-marcos-phineas-fisher-hack-back-a-diy-guide-hacking-team.

Fisher, Phineas, and CrimethInc. 2018. “HackBack! Talking with Phineas Fisher”. The Anarchist Library. theanarchistlibrary.org/library/crimethinc-hackback-tal-king-with-phineas-fisher.

Franceschi-Bicchierai, Lorenzo. 2015. “There’s Evidence the “Yemen Cyber Army” Is Actually Iranian”. VICE (June). www.vice.com/en/article/theres-evi-dence-the-yemen-cyber-army-is-actually-iranian/.

Franceschi-Bicchierai, Lorenzo. 2017. “The Hack That Caused a Crisis in the Middle East Was Easy”. VICE (June). www.vice.com/en/article/the-hack-that-caused-a-crisis-in-the-middle-east-was-easy/.Frenkel, Sheera. 2015. “Meet The Mysterious New Hacker Army Freaking Out

The Middle East”. BuzzFeed News (June). www.buzzfeednews.com/article/shee-rafrenkel/who-is-the-yemen-cyber-army.

Goldstein, Emmanuel. 2018. “Hacktivism and the Hacker Promise”. Blog LawColumbia. blogs.law.columbia.edu/uprising1313/emmanuel-goldstein-hacktivis-m-and-the-hacker-promise/.

GonjeshkeDarande. 2023. “GonjeshkeDarandeOfficial”. t.me/GonjeshkeDarandeOfficial 3.

Goodin, Dan. 2022a. “After Ukraine Recruits an ‘IT Army’, Dozens of Russian Sites Go Dark”. Ars Technica (February). arstechnica.com/information-techno-logy/2022/02/after-ukraine-recruits-an-it-army-dozens-of-russian-sites-go--dark/.

Goodin, Dan. 2022b. “Pro-Russia Threat Group Killnet Is Pummeling Lithuania with DDoS Attacks”. Ars Technica (June). arstechnica.com/information-techno-logy/2022/06/pro-russia-threat-group-killnet-is-pummeling-lithuania-with-d-

dos-attacks/.

Great. 2012. “Shamoon the Wiper — Copycats at Work” (August). securelist.com/shamoon-the-wiper-copycats-at-work/57854/.

Greenberg, Andy. 2019. “A Mystery Agent Is Doxing Iran’s Hackers and Dumping Their Code”. Wired. www.wired.com/story/iran-hackers-oilrig-read-my-lips/.

Greenberg, Andy. 2024. “How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar”. Wired. www.wired.com/story/predatory-sparrow-cyberat-tack-timeline/.

Groll, Elias. 2016. “The NSA Has a New Disclosure Policy: Getting Hacked”. Foreign Policy. foreignpolicy.com/2016/08/18/the-nsa-has-a-new-disclosure-po-licy-getting-hacked/.

Gross, Michael L., Daphna Canetti, and Dana R. Vashdi. 2017. “Cyberterrorism: Its Effects on Psychological Well-Being, Public Confidence and Political Attitudes”.Journal of Cybersecurity 3, no. 1: 49–58. doi.org/10.1093/cybsec/tyw018. DOI: https://doi.org/10.1093/cybsec/tyw018

Guerrero-Saade, Juan Andrés and Brian Bartholomew. 2016. “Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks”. Virus Bulletin. www.virusbulletin.com/conference/vb2016/abstracts/wave-your-false-flags-deception-tactics-muddying-attribution-targeted-attacks.

Haggard, Stephan and Jon R. Lindsay. 2015. “North Korea and the Sony Hack: Exporting Instability Through Cyberspace” (May). www.eastwestcenter.org/publications/north-korea-and-the-sony-hack-exporting-instability-through-cyberspace.

Halili, Eduart. 2022. “Cyber Attacks Forces AKSHI Close Government Online Systems”. Albania Daily News. albaniandailynews.com/news/cyber-attacks-for-ces-akshi-close-government-online-systems.

Howard, Philip N., Aiden Duffy, Deen Freelon, M. M. Hussain, Will Mari, and Marwa Maziad. 2011. “Opening Closed Regimes: What Was the Role of Social Media During the Arab Spring?” SSRN Scholarly Paper No. 2595096. Social Science Research Network. doi.org/10.2139/ssrn.2595096. DOI: https://doi.org/10.2139/ssrn.2595096

Hulcoop, Adam, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert. 2017. “Tainted Leaks: Disinformation and Phishing With a Russian Nexus”. Citizen Lab Research Report no. 92. University of Toronto. citizenlab. ca/2017/05/tainted-leaks-disinformation-phish/.

Ikwu, Ruth, Luca Giommoni, Amir Javed, Pete Burnap, and Matthew Williams. 2023. “Digital Fingerprinting for Identifying Malicious Collusive Groups on Twitter”. Journal of Cybersecurity 9, no. 1: tyad014. doi.org/10.1093/cybsec/ DOI: https://doi.org/10.1093/cybsec/tyad014

tyad014.

Intelligence, Microsoft Threat. 2022. “Microsoft Investigates Iranian Attacks against the Albanian Government”. Microsoft Security Blog (September). www.mi-crosoft.com/en-us/security/blog/2022/09/08/microsoft-investigates-iranian--attacks-against-the-albanian-government/.

Intrusion Truth. 2017. intrusiontruth.wordpress.com/.

IT Army of Ukraine. 2022. t.me/itarmyofukraine2022.

Jenkins, Luke, Emiel Haeghebaert, Ben Read, and Alice Revelli. 2022. “Roadsweep Ransomware Targets the Albanian Government”. cloud.google.com/blog/topics/threat-intelligence/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against/.

Jofre, TZVI. 2020. “Hezbollah-Affiliated Financial Org Hacked, InformationLeaked”. The Jerusalem Post (December). www.jpost.com/breaking-news/hezbol-lah-affiliated-financial-org-hacked-information-leaked-653690.

Jordan, Tim. 2015. “Hacktivism: Operation Tunisia, Modular Tactics and Information Activism”. In Information Politics. Liberation and Exploitation in the Digital Society. Pluto Press. doi.org/10.2307/j.ctt183p2xf.14.

Karagiannopoulos, Vasileios. 2018. Living With Hacktivism. Springer International Publishing. link.springer.com/10.1007/978-3-319-71758-6. DOI: https://doi.org/10.1007/978-3-319-71758-6

Karagiannopoulos, Vasileios. 2021. “A Short History of Hacktivism: Its Past and Present and What Can We Learn from It”. In Rethinking Cybercrime: Critical Debates, edited by Tim Owen and Jessica Marshall. Springer International Publishing. doi. DOI: https://doi.org/10.1007/978-3-030-55841-3_4

org/10.1007/978-3-030-55841-3_4.

Kausch, Kristina. 2017. “Cheap Havoc: How Cyber-Geopolitics Will Destabilize the Middle East”. www.gmfus.org/news/cheap-havoc-how-cyber-geopolitics-will-destabilize-middle-east.

Keller, Max Fisher, Jared. 2011. The Atlantic (August). www.theatlantic.com/in-ternational/archive/2011/08/syrias-digital-counter-revolutionaries/244382/.

Klein, Adam G. 2015. “Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press”. Communication Monographs 82, no. 33: 379–401. doi.org/10.1080/03637751.2015.1030682. DOI: https://doi.org/10.1080/03637751.2015.1030682

Kostyuk, Nadiya, and Yuri M. Zhukov. 2019. “Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?” Journal of Conflict Resolution 63, no. 2: 317–47.doi.org/10.1177/0022002717737138. DOI: https://doi.org/10.1177/0022002717737138

Leyden, John. 2010. “4chan Launches DDoS against Entertainment Industry”.

www.theregister.com/2010/09/20/4chan_ddos_mpaa_riaa/.

Mandiant. 2022. “Hacktivists Collaborate with GRU-Sponsored Threat Actors”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/gru-rise-telegram-minions.

Mandiant. 2023. “The GRU’s Disruptive Playbook”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/gru-disruptive-playbook.

Mandiant. 2023b. “KillNet Showcases New Capabilities While Repeating Older Tactics”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/killnet-new-capabilities-older-tactics.

Marczak, Bill and John Scott-Railton. 2016. “The Million Dollar Dissident: NSO Group’s iPhone Zero-Days Used against a UAE Human Rights Defender”. Citizen Lab Research Report no. 78. University of Toronto. citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/.

Marczak, Bill, John Scott-Railton, Adam Senft, Irene Poetranto, and Sarah McKune. 2015. “Mapping FinFisher’s Continuing Proliferation”. Citizen Lab Research Report no. 64. University of Toronto. citizenlab.ca/2015/10/mapping-finfishers-continuing-proliferation/.

Maurer, Tim. 2018. Cyber Mercenaries: The State, Hackers, and Power. Cambridge University Press. www.cambridge.org/core/books/cyber-mercenaries/B685B7555E1C52FBE5DFE6F6594A1C00.

Milone, Mark. 2003. “Hacktivism: Securing the National Infrastructure”.Knowledge, Technology & Policy 16, no. 1: 75–103. doi.org/10.1007/s12130-003-1017-5. DOI: https://doi.org/10.1007/s12130-003-1017-5

Mueller, Robert S. 2019. “Report on the Investigation into Russian Interference in the 2016 Presidential Election”. www.justice.gov/archives/sco/file/1373816/dl.

Nakashima, Ellen and Shane Harris. 2018. “How the Russians Hacked the DNC and Passed Its Emails to WikiLeaks”. The Washington Post. www.washingtonpost. com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-it-s-emails-to wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html.

Naprys, Ernestas. 2024. “Belarusian KGB Allegedly Breached, Hackers Dox over 8600 Agents”. Cybernews (April). cybernews.com/news/belarusian-kgb-allege-dly-breached-cyber-partisans/.

Natto Thoughts. 2024. “Intrusion Truth Methods: How Can They Get It Right Again and Again?” Substack newsletter. Natto Thoughts (April). nattothoughts.substack.com/p/intrusion-truth-methods-how-can-they.

Novetta. 2016. “Operation Blockbuster: Unraveling the Long Thread of the Sony Attack”. Docslib. docslib.org/doc/5282771/operation-blockbuster-unraveling-the-long-thread-of-the-sony-attack-3-caveats.

Olson, Parmy. 2013. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Reprint edition. Back Bay Books.

Perlroth, Nicole, and David E. Sanger. 2017. “Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool”. World. The New York Times (May). www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html.

Privacy International. 2018. The Global Surveillance Industry. privacyinternational.org/explainer/1632/global-surveillance-industry.

Rader and Wash. 2015. “Identifying patterns in informal sources of security information”. Journal of Cybersecurity 1, no. 1: 121–44. doi.org/10.1093/cybsec/tyv008 DOI: https://doi.org/10.1093/cybsec/tyv008

RecordedFuture. 2015. Cyber Berkut Graduates From DDoS Stunts to Purveyor of Cyber Attack Tools. www.recordedfuture.com/blog/cyber-berkut-analysis.

Rid, Thomas. 2016. “All Signs Point to Russia Being Behind the DNC Hack”. VICE (July). www.vice.com/en/article/all-signs-point-to-russia-being-behind-the-dnc-hack/.

Rid, Thomas. 2017. “Disinformation: A Primer In Russian Active Measures And Influence Campaigns Panel II”. Select Committee on Intelligence. www.govinfo. gov/content/pkg/CHRG-115shrg25998/html/CHRG-115shrg25998.htm.

Roberts, Paul. 2010. “Attacks On MPAA’s UK Law Firm Lead to Data Leaks, Lawsuit”. Threatpost. threatpost.com/attacks-mpaas-uk-law-firm-lead-data-leaks-lawsuit-092710/74517/.

Romagna, Marco. 2020. “Hacktivism: Conceptualization, Techniques, and Historical View”. In The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by Thomas J. Holt and Adam M. Bossler. Springer International Publishing. doi.org/10.1007/978-3-319-78440-3_34. DOI: https://doi.org/10.1007/978-3-319-78440-3_34

Samuel, Alexandra Whitney. 2004. Hacktivism and the Future of Political Participation. Harvard University. Sauter, Molly. 2014. The Coming Swarm : DDoS Actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury Academic.

Schneier, Bruce. 2017. “Who Are the Shadow Brokers?” Schneier on Security (May). www.schneier.com/blog/archives/2017/05/who_are_the_sha.html.

Seblani, Sana. 2021. Lebanon: The Hacking of Hezbollah’s Al-Qard Al-Hasan and US Sanctions. daraj.media/en/lebanon-the-hacking-of-hezbollahs-al-qard-al-ha-san-and-us-sanctions/.

Shehabat, Ahmad. 2012. The Social Media Cyber-War: The Unfolding Events in the

Syrian Revolution 2011, no. 6: 2. www.hca.westernsydney.edu.au/gmjau/archive/v6_2012_2/ahmad_shehabat%20_RA.html.

Sigholm, Johan. 2016. “Non-State Actors in Cyberspace Operations”. Journal of Military Studies 4, no. 1: 1–37. doi.org/10.1515/jms-2016-0184. DOI: https://doi.org/10.1515/jms-2016-0184

Siqi, Cao. 2023. Exclusive: Hacker Group with Members from Europe, North AmericaFound to Have Launched Cyberattacks against China. www.globaltimes.cn/page/202302/1285744.shtml.

Soesanto, Stefan. 2022. “The IT Army of Ukraine”. Center for Security Studies (June). css.ethz.ch/en/center/CSS-news/2022/06/the-it-army-of-ukraine.html.

Streams, Kimber. 2012. “Anonymous “Operation Payback” Hackers Convicted for Costly DDoS Attacks”. The Verge (December). www.theverge.com/2012/12/6/3735622/anonymous-conviction-christopher-weatherhead-operation-payback.

Suiche, Matt. 2017. “Lessons from TV5Monde 2015 Hack”. Comae Technologies (June). medium.com/comae/lessons-from-tv5monde-2015-hack-c4d62f07849d.

Taylor, Paul A. 2005. “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?” New Media & Society 7, no. 5: 625–46. doi.org/10.1177/1461444805056009. DOI: https://doi.org/10.1177/1461444805056009

Threat Hunter Team. 2018. Shamoon: Destructive Threat Re-Emerges with New Sting in Its Tail. www.security.com/threat-intelligence/shamoon-destructive-threat-re-emerges-new-sting-its-tail.

ThreatConnect. 2016a. “Guccifer 2.0: The Man, the Myth, the Legend?” ThreatConnect (July). threatconnect.com/blog/guccifer-2-0-the-man-the-myth-the-legend/.

ThreatConnect. 2016b. “Hacktivists vs Faketivists: Fancy Bears in Disguise”. ThreatConnect (December). threatconnect.com/blog/faketivist-vs-hacktivist-how-they-differ-2/.

Tripwire. 2016. Shadow Brokers Leaks Dilemma – History of Events Explained. www.tripwire.com/state-of-security/shadow-brokers-leaks-dilemma-history-e-vents-explained.

Ukrainian Ministry of Digiral Transformation. 2022. Ukraine Ministry of Digiral Transformation: IT Army Blocks Russian Sites in a Few Minutes — the Main Victories of Ukraine on the Cyber Front. www.kmu.gov.ua/en/news/mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti.

United States Department of Justice. 2018a. Park Jin Hyok — Complaint. www. justice.gov/usao-cdca/press-release/file/1091951.

United States Department of Justice. 2018b. U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations (October). www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and.

United States Department of Justice. 2019. English: U.S. v. Viktor Borisovich Netyksho (Case 1:18-Cr-215) Indictment Filed by the Mueller Investigation (July). www.justice.gov/file/1080281/download. commons.wikimedia.org/wiki/File:U.S._v._Viktor_Borisovich_Netyksho,_et_al,_Indictment.pdf.

Vijayan, Jai. 2019. Data Dump Purportedly Reveals Details on Previously Unknown Iranian Threat Group. www.darkreading.com/cyberattacks-data-breaches/data-dump-purportedly-reveals-details-on-previously-unknown-iranian-threat-group.

WADA. 2016. “Cyber Security Update: WADA’s Incident Response”. World AntiDoping Agency (October). www.wada-ama.org/en/news/cyber-security-update-wadas-incident-response.

Wes. 2024. “Phineas Fisher: The World’s Hacktivist”. Medium (November). medium.com/@phishfinding/phineas-fisher-the-worlds-hacktivist-483601802ca8.

WikiLeaks. 2014. SpyFiles 4. wikileaks.org/spyfiles4/.WikiLeaks. 2015. The Hackingteam Archives. wikileaks.org/hackingteam/emails/.

Yemen Cyber Army. 2015. Yemen Cyber Army Announces Target List. cryptome.org/2015/07/yemen-cyber-army-targets.htm.

Zetter, Kim. 2014. “Sony Got Hacked Hard: What We Know and Don”t Know So Far”. Wired. www.wired.com/2014/12/sony-hack-what-we-know/.

Zetter, Kim. 2022a. “Intrusion Truth — Five Years of Naming and Shaming China’s Spies”. Zero Day (March). www.zetter-zeroday.com/interview-with-intrusion-truth/.

Zetter, Kim. 2022b. “Unmasking China’s State Hackers”. Zero Day (March). www.zetter-zeroday.com/unmasking-chinas-state-hackers/.

Downloads

Publicado

2025-12-12

Como Citar

Izycki, E., & Lavandoski da Silva, L. G. (2025). Há hacktivismo real? Um Método para Distinguir Operações de Falsa Bandeira de Hacktivistas Genuínos. Revista Brasileira De Estudos De Defesa, 12(1), e025020, p. 1–43. https://doi.org/10.26792/rbed.v12i1.75460

Edição

Seção

Artigos