Attacker: SABUNMANDI CYBER TEAM
Target: https://embmr.foreign.gov.ly/hack.txt
Source: http://www.zone-h.org/mirror/id/41316023
Attacker: ynR !
Target: https://xproy.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316019
Attacker: ynR !
Target: https://sapaam.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316018
Attacker: ynR !
Target: https://files.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316017
Attacker: ynR !
Target: https://consultaci.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316016
Attacker: ynR !
Target: https://consulta2024.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316015
Attacker: ynR !
Target: https://bibliotecas.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316014
Attacker: ynR !
Target: https://pmd.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316012
Attacker: ynR !
Target: https://sapam.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316010
Attacker: ynR !
Target: https://partenon.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316008
Attacker: ynR !
Target: https://carnaval.zihuatanejodeazueta.gob.mx/ynr.html
Source: http://www.zone-h.org/mirror/id/41316007
Attacker: Inside Alone7
Target: tuc-counit.moph.go.th/kid.htm
Source: https://zone-xsec.com/mirror/id/703336
Attacker: Inside Alone7
Target: amyloid.neurology.ucla.edu/rea…
Source: https://zone-xsec.com/mirror/id/703335
Attacker: ./FreedomXploit
Target: massmedia.prd.go.th/profile/20…
Source: https://zone-xsec.com/mirror/id/703334
Attacker: Boss Ranzen
Target: mail.grangeisc.edu.kh/stressed…
Source: https://zone-xsec.com/mirror/id/703333
Attacker: Boss Ranzen
Target: test.grangeisc.edu.kh/stressed…
Source: https://zone-xsec.com/mirror/id/703332
Attacker: Boss Ranzen
Target: student.grangeisc.edu.kh/stres…
Source: https://zone-xsec.com/mirror/id/703331
Attacker: Boss Ranzen
Target: clone.grangeisc.edu.kh/stresse…
Source: https://zone-xsec.com/mirror/id/703330
Attacker: Boss Ranzen
Target: grangeisc.edu.kh/stressed.html
Source: https://zone-xsec.com/mirror/id/703329
Attacker: ./FreedomXploit
Target: pbms.prd.go.th/profile/2025012…
Source: https://zone-xsec.com/mirror/id/703328
Attacker: ./FreedomXploit
Target: tusd-thainews.prd.go.th/files/…
Source: https://zone-xsec.com/mirror/id/703327
Attacker: ./G1L4N6_ST86
Target: journal.tac.edu.et/readme.html
Source: https://zone-xsec.com/mirror/id/703222
Attacker: yui
Target: sefin.brasilnovo.pa.gov.br/giat/yui.txt
Source: https://defacer.id/mirror/id/140082
Attacker: yui
Target: sccursos.saude.sc.gov.br/yui.txt
Source: https://defacer.id/mirror/id/140081
Cybersecurity Attack Analysis Report: Government Website Defacements
Introduction
In recent months, an alarming trend has emerged in the realm of cybersecurity, with a notable increase in attacks on government websites. Specifically, we have observed a wave of website defacements targeting various governmental institutions worldwide. This report analyzes the nature of these attacks, identifies the victim countries, and highlights the key sectors affected.
Nature of the Attacks
The attacks primarily involved defacement of official websites, where hackers replaced the legitimate content with their own messages, often containing political statements or demonstrations of power. These cyber operations were executed by various hacking groups, showcasing their sophistication in breaching security and gaining access to high-profile domains.
Victim Countries and Targeted Sectors
1. Libya
– Targeted Sector: Foreign Affairs
– Website: embmr.foreign.gov.ly
– Attacker: SABUNMANDI CYBER TEAM
– This attack on the Libyan Foreign Ministry signifies the targeting of diplomatic entities, which can undermine national representation and official communications.
2. Mexico
– Targeted Sectors: Multiple municipal services
– Websites: Various sites including xproy.zihuatanejodeazueta.gob.mx and others
– Attacker: ynR !
– This series of attacks focused predominantly on services in Zihuatanejo, targeting administration and possibly cultural affairs, evident from the diversity of the targeted URLs (e.g., libraries, consultation services, and local government).
3. Thailand
– Targeted Sectors: Health and Mass Media
– Websites: Various health and media government portals, such as PLACEHOLDER2c5d34e574085b76 and PLACEHOLDERf94385a9214d3a53
– Attacker: Inside Alone7 and FreedomXploit
– The Thai health sector and mass media services came under attack, indicating possible political motives or efforts to disrupt public information dissemination.
4. Ethiopia
– Targeted Sector: Education
– Website: journal.tac.edu.et
– Attacker: G1L4N6_ST86
– The attack on an educational institution suggests a focus on undermining academia or promoting specific ideologies through educational platforms.
5. Brazil
– Targeted Sector: Local Government Services
– Websites: PLACEHOLDER3e41b6435946f97e and PLACEHOLDER4f2c69f586e89cee
– Attacker: yui
– The targeting of local government and health-associated websites reflects ongoing concerns about public service stability, especially during pandemic recovery phases.
6. Cambodia
– Targeted Sector: Education
– Websites: Multiple sites under grangeisc.edu.kh
– Attacker: Boss Ranzen
– The attacks were directed at school and educational resource websites, threatening educational integrity and access to information.
Conclusion
The increasing frequency of cyberattacks on government websites illustrates a pressing vulnerability in the digital infrastructure of nations. These high-profile breaches not only compromise the integrity of official communications but also erode public trust in government institutions. As attackers leverage these platforms to promote agendas or wreak havoc, it becomes imperative for affected countries to bolster their cybersecurity defenses, raise awareness, and implement stricter measures to protect sensitive governmental data. Governments must also engage in cooperative international cyber defense strategies to mitigate the risks posed by these malicious entities.