Geo-Poli-Cyber™ Warfare | UK Suffers Major Hack “in Response to US & UK Airstrikes on Yemen”. | Survivability News Hacking the Unhackables Series.

With reprisals and escalation were expected to follow after the US and UK air strikes on Yemen, a statement on messaging platform Telegram, came from the ‘Anonymous Sudan’ hacking group with a warning saying: “Big attack on UK soon, in response to the air attacks in Yemen and unconditional support of the genocidal Zionist regime in Israel.”

Less than an hour later they claimed to have attacked the London Internet Exchange (LINX).

LINX, is a firm that has offices in London and Peterborough, is one of the world’s largest internet exchange points.

It works by enhancing the speed and reliability of internet providers and allowing direct interconnection between different networks.

Anonymous Sudan said their attack hit LINX’s routing infrastructure which they claimed rendered some services “unreachable”.

Their attack came as the US and UK conducted airstrikes against Houthi military targets in nearly 30 locations across Yemen on Thursday.

More analysis by the MLi Group and Survivability news to come on:

This Geo-Poli-Cyber™ (GPCyber™) attack of a UK Critical National Infrastructure (CNI).
The likelihood of American CNIs getting GPCyber™ targeted in reprisal for:

B1 – US’s leading role in Airstrikes on Yemen,
B2 – Biden administration giving Israel arms and 100% green light to “finish the job” causing the killing of more than 24K Gaza civilians, majority being women and children,
B3 – blocking UN resolution for a humanitarian ceasefire.

What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more

Generated by Feedzy
Latest news