¿Existe realmente el hacktivismo genuino?

Autores/as

DOI:

https://doi.org/10.26792/rbed.v12i1.75460

Palabras clave:

Hacktivismo, Operaciones de falsa bandera, Seguridad Cibernética, Amenazas Híbridas

Resumen

El hacktivismo ha sido un fenómeno persistente, aunque en constante evolución, desde los inicios de internet. Mientras que las primeras acciones hacktivistas eran en gran medida simbólicas, en la década de 2000 surgieron campañas con impactos concretos. Sin embargo, a medida que estas actividades ganaban visibilidad, actores patrocinados por Estados comenzaron a adoptar tácticas de bandera falsa —imitando al hacktivismo para ocultar su participación en operaciones cibernéticas y aprovechar la simpatía del público hacia objetivos políticos “puros”. En un mundo políticamente polarizado, distinguir entre movimientos políticos genuinos e injerencias extranjeras es cada vez más relevante. Este artículo examina la diferencia entre el hacktivismo auténtico y las operaciones de bandera falsa respaldadas por Estados, a través del análisis de 24 casos destacados. Mediante un enfoque comparativo, se establece una metodología para diferenciar actividades hacktivistas auténticas de acciones estatales estratégicamente disfrazadas. El análisis identifica cuatro indicadores clave: (i) la duración y continuidad de las actividades del grupo, (ii) la selección y justificación de los objetivos, (iii) el grado de sofisticación de los métodos de ataque empleados y (iv) la manipulación de la información filtrada para servir a intereses estatales. Los resultados revelan que el hacktivismo genuino representa una minoría entre los incidentes cibernéticos de alto perfil, siendo la mayoría de los casos bien documentados atribuibles a actores estatales que buscan una negación plausible de sus operaciones.

Descargas

Los datos de descargas todavía no están disponibles.

Biografía del autor/a

Eduardo Izycki, Universidade de Brasília (UnB)

es Doctorando en Relaciones Internacionales en la Universidad de Brasilia (UnB). Es profesor en el IDP, Brasília, DF, Brasil. Lidera un grupo de investigación en Ciberseguridad en el Grupo de Estudios e Investigación en Seguridad Internacional del Instituto de Relaciones Internacionales de la Universidad de Brasilia — Gepsi UnB. Orcid.org/0000-0001-9514-7723. Correo electrónico: eduardo.izycki@aluno.unb

Luiz Gustavo Lavandoski da Silva, Universidade Federal do ABC (UFABC)

 es doctorando en Economía Política Mundial en la Universidad Federal del ABC (UFABC). Se desempeña como analista e investigador en seguridad cibernética en el sector privado en São Paulo, SP, Brasil. Es miembro del Grupo de Estudios e Investigación en Seguridad Internacional del Instituto de Relaciones Internacionales de la Universidad de Brasília (GEPSI-UnB) y del Instituto de Defensa Cibernética (IDCIBER).

Citas

ANSSI. 2015. “Attaque Informatique Contre TV5 Monde: L’ANSSI Mobilisée”.cyber.gouv.fr/publications/attaque-informatique-contre-tv5-monde-lanssi-mobi-lisee.

ANSSI. 2017. “Retour Technique de l’incident de TV5Monde”. www.sstic.org/2017/presentation/2017_cloture/.

Antoniuk, Daryna. 2023. “Report Claims to Reveal Identity of Russian Hacktivist Leader”. The Record. therecord.media/killmilk-identity-revealed-gazeta-ru-kill-net-russia.

Antoniuk, Daryna. 2024. “How the Belarusian Cyber Partisans Are Fighting a Digital War against Two Dictators”. The Record. therecord.media/belarusian-cyber-partisans-operations-politics-russia-ukraine.

Autenrieth, A. and A. Kirstädter. 2000. “Fault Tolerance and Resilience Issues in IP-Based Networks”. www.semanticscholar.org/paper/Fault-Tolerance-and-Resilience-Issues-in-IP-Based-Autenrieth-Kirst%C3%A4dter/f44807ada8b-

61cdbd4293b79187721137c3233da.

Backchannel and Aaron DeVera. 2021. “AgainstTheWest, the Hacking Group Wreaking Havoc on Chinese Government and Corporate Targets”. Substack newsletter. Backchannel Blog (December). backchannel.substack.com/p/against-thewest-the-hacking-group.

Barlow, John Perry. 2016. “A Declaration of the Independence of Cyberspace”. Electronic Frontier Foundation (January). www.eff.org/cyberspace-independence.

BBC. 2012. “Shamoon Virus Targets Energy Sector Infrastructure”. Technology.

BBC News (August). www.bbc.com/news/technology-19293797.

Beckerman, Carly E. 2022. “Is There a Cyber Security Dilemma?” Journal of Cybersecurity 8, no. 1: tyac012. doi.org/10.1093/cybsec/tyac012. DOI: https://doi.org/10.1093/cybsec/tyac012

Beraldo, Davide. 2022. “Movements as Multiplicities and Contentious Branding: Lessons from the Digital Exploration of #Occupy and #Anonymous”. Information, Communication & Society 25, no. 8: 1098–114. doi.org/10.1080/1369118X.2020.1847164. DOI: https://doi.org/10.1080/1369118X.2020.1847164

Blumenthal, Erin. 2021. “Hezbollah’s al-Qard al-Hasan and Lebanon’s Banking Sector”. FDD (May). www.fdd.org/analysis/2021/05/11/hezbollahs-al-qard-al-hasan-and-lebanons-banking-sector/.

Bronk, Christopher and Eneken Tikk-Ringas. 2013. “The Cyber Attack on Saudi Aramco”. Survival 55, no. 2: 81–96. doi.org/10.1080/00396338.2013.784468. DOI: https://doi.org/10.1080/00396338.2013.784468

Brown, Rebekah. 2017. “The Shadow Brokers Leaked Exploits Explained”. Rapid7 (April). www.rapid7.com/blog/post/2017/04/18/the-shadow-brokers-leaked-exploits-faq/.

Burton, Joe and Clare Lain. 2020. “Desecuritising Cybersecurity: Towards a Societal Approach”. Journal of Cyber Policy 5, no. 3: 449–70. doi.org/10.1080/23738871.2020.1856903. DOI: https://doi.org/10.1080/23738871.2020.1856903

Chertoff, Michael. 2017. “A public policy perspective of the Dark Web”. Journal of Cyber Policy 2, no. 1: 26–38. doi.org/10.1080/23738871.2017.1298643. DOI: https://doi.org/10.1080/23738871.2017.1298643

CISA. 2022a. “Iranian State Actors Conduct Cyber Operations Against the Government of Albania” (September). www.cisa.gov/news-events/cyberse-curity-advisories/aa22-264a.

CISA. 2022b. “Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure” (May). www.cisa.gov/news-events/cybersecurity-advisories/aa-22-110a.

Coleman, E. Gabriella. 2017. “The Public Interest Hack”. Limn 8 (May): 18.

Coleman, Gabriella. 2013. “Anonymous and the Politics of Leaking”. In Beyond WikiLeaks: Implications for the Future of Communications, Journalism and Society, edited by Benedetta Brevini, Arne Hintz, and Patrick McCurdy. Palgrave Macmillan UK. doi.org/10.1057/9781137275745_13.

Coleman, Gabriella. 2014a. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso. www.versobooks.com/en-gb/products/21-hacker-hoaxer-whistleblower-spy.

Coleman, Gabriella. 2014b. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous. Verso. www.versobooks.com/en-gb/products/21-hacker-hoaxer-whistleblower-spy.

Cordesman, Anthony H. 2016. The Changing Gulf Balance and the Iranian Threat (August). www.csis.org/analysis/changing-gulf-balance-and-iranian-threat.

Cox, Joseph. 2018. “Meet ‘Intrusion Truth’, the Mysterious Group Doxing Chinese Intel Hackers”. VICE (August). www.vice.com/en/article/intrusion-tru-th-group-doxing-hackers-chinese-intelligence/.

Cristiano, Fabio, Xymena Kurowska, Tim Stevens, et al. 2023. “Cybersecurity and the Politics of Knowledge Production: Towards a Reflexive Practice.” Journal of Cyber Policy 8, no. 3: 331–64. doi.org/10.1080/23738871.2023.2287687. DOI: https://doi.org/10.1080/23738871.2023.2287687

CrowdStrike. 2020. “CrowdStrike’s Work with the Democratic National Committee: Setting the Record Straight”. www.crowdstrike.com/en-us/blog/bears-midst-intrusion-democratic-national-committee/.

CyberPartisans. 2025. “Belarusian Cyber Partisans”. www.by.cpartisans.org/en.

Cylance. 2014. “Operation Cleaver”. www.aclu.org/sites/default/files/field_do-cument/Cylance-Operation-Cleaver-Report-1748-1833.pdf.

DataBreaches.Net. 2022. “An Interview with AgainstTheWest”. databreaches.net/2022/04/03/an-interview-with-againstthewest/.

Defense Intelligence Agency. 2017. Russia Military Power: Building a Military to Support Great Power Aspirations.” publicintelligence.net/dia-russia-military-po-wer-2017/.

Deibert, Ronald. 2011. “Syrian Electronic Army: Disruptive Attacks and Hyped Targets” (June). deibert.citizenlab.ca/2011/06/syrian-electronic-army-disrupti-ve-attacks-and-hyped-targets/.

Denning, D. 2001. “Activism, Hacktivism, and Cyberterrorism: The Internet As a Tool for Influencing Foreign Policy”. www.semanticscholar.org/paper/Activism,-Hacktivism,-and-Cyberterrorism:-the-As-a-Denning/829b21633c51252429abcb

1ac717ecc4efc64566.

Dreyfuss, Suelette. 1997. Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier. Mandarin Australia.

Egloff, Florian J. 2015. “Cybersecurity and the Age of Privateering: A Historical Analogy”. www.semanticscholar.org/paper/Cybersecurity-and-the-Age-of-Privateering%3A-AEgloff/dd21875046c939b63afa704d6b4c5c26edf80401.

FireEye. 2017. “APT28 At the Center of the Storm”.

Fisher, Phineas. 2014. “Hackback — A DIY GUIDE II”. The Anarchist Library. theanarchistlibrary.org/library/phineas-fisher-hackback-a-diy-guide-ii.

Fisher, Phineas. 2016. “Hackback — A DIY GUIDE 1”. The Anarchist Library. theanarchistlibrary.org/library/phineas-fisher-hackback-a-diy-guide-i.

Fisher, Phineas. 2017. “Hack Back — A DIY Guide (Hacking Team)”. The Anarchist Library theanarchistlibrary.org/library/hack-back-subcowmandante-marcos-phineas-fisher-hack-back-a-diy-guide-hacking-team.

Fisher, Phineas, and CrimethInc. 2018. “HackBack! Talking with Phineas Fisher”. The Anarchist Library. theanarchistlibrary.org/library/crimethinc-hackback-tal-king-with-phineas-fisher.

Franceschi-Bicchierai, Lorenzo. 2015. “There’s Evidence the “Yemen Cyber Army” Is Actually Iranian”. VICE (June). www.vice.com/en/article/theres-evi-dence-the-yemen-cyber-army-is-actually-iranian/.

Franceschi-Bicchierai, Lorenzo. 2017. “The Hack That Caused a Crisis in the Middle East Was Easy”. VICE (June). www.vice.com/en/article/the-hack-that-caused-a-crisis-in-the-middle-east-was-easy/.Frenkel, Sheera. 2015. “Meet The Mysterious New Hacker Army Freaking Out

The Middle East”. BuzzFeed News (June). www.buzzfeednews.com/article/shee-rafrenkel/who-is-the-yemen-cyber-army.

Goldstein, Emmanuel. 2018. “Hacktivism and the Hacker Promise”. Blog LawColumbia. blogs.law.columbia.edu/uprising1313/emmanuel-goldstein-hacktivis-m-and-the-hacker-promise/.

GonjeshkeDarande. 2023. “GonjeshkeDarandeOfficial”. t.me/GonjeshkeDarandeOfficial 3.

Goodin, Dan. 2022a. “After Ukraine Recruits an ‘IT Army’, Dozens of Russian Sites Go Dark”. Ars Technica (February). arstechnica.com/information-techno-logy/2022/02/after-ukraine-recruits-an-it-army-dozens-of-russian-sites-go--dark/.

Goodin, Dan. 2022b. “Pro-Russia Threat Group Killnet Is Pummeling Lithuania with DDoS Attacks”. Ars Technica (June). arstechnica.com/information-techno-logy/2022/06/pro-russia-threat-group-killnet-is-pummeling-lithuania-with-d-

dos-attacks/.

Great. 2012. “Shamoon the Wiper — Copycats at Work” (August). securelist.com/shamoon-the-wiper-copycats-at-work/57854/.

Greenberg, Andy. 2019. “A Mystery Agent Is Doxing Iran’s Hackers and Dumping Their Code”. Wired. www.wired.com/story/iran-hackers-oilrig-read-my-lips/.

Greenberg, Andy. 2024. “How a Group of Israel-Linked Hackers Has Pushed the Limits of Cyberwar”. Wired. www.wired.com/story/predatory-sparrow-cyberat-tack-timeline/.

Groll, Elias. 2016. “The NSA Has a New Disclosure Policy: Getting Hacked”. Foreign Policy. foreignpolicy.com/2016/08/18/the-nsa-has-a-new-disclosure-po-licy-getting-hacked/.

Gross, Michael L., Daphna Canetti, and Dana R. Vashdi. 2017. “Cyberterrorism: Its Effects on Psychological Well-Being, Public Confidence and Political Attitudes”.Journal of Cybersecurity 3, no. 1: 49–58. doi.org/10.1093/cybsec/tyw018. DOI: https://doi.org/10.1093/cybsec/tyw018

Guerrero-Saade, Juan Andrés and Brian Bartholomew. 2016. “Wave Your False Flags! Deception Tactics Muddying Attribution in Targeted Attacks”. Virus Bulletin. www.virusbulletin.com/conference/vb2016/abstracts/wave-your-false-flags-deception-tactics-muddying-attribution-targeted-attacks.

Haggard, Stephan and Jon R. Lindsay. 2015. “North Korea and the Sony Hack: Exporting Instability Through Cyberspace” (May). www.eastwestcenter.org/publications/north-korea-and-the-sony-hack-exporting-instability-through-cyberspace.

Halili, Eduart. 2022. “Cyber Attacks Forces AKSHI Close Government Online Systems”. Albania Daily News. albaniandailynews.com/news/cyber-attacks-for-ces-akshi-close-government-online-systems.

Howard, Philip N., Aiden Duffy, Deen Freelon, M. M. Hussain, Will Mari, and Marwa Maziad. 2011. “Opening Closed Regimes: What Was the Role of Social Media During the Arab Spring?” SSRN Scholarly Paper No. 2595096. Social Science Research Network. doi.org/10.2139/ssrn.2595096. DOI: https://doi.org/10.2139/ssrn.2595096

Hulcoop, Adam, John Scott-Railton, Peter Tanchak, Matt Brooks, and Ron Deibert. 2017. “Tainted Leaks: Disinformation and Phishing With a Russian Nexus”. Citizen Lab Research Report no. 92. University of Toronto. citizenlab. ca/2017/05/tainted-leaks-disinformation-phish/.

Ikwu, Ruth, Luca Giommoni, Amir Javed, Pete Burnap, and Matthew Williams. 2023. “Digital Fingerprinting for Identifying Malicious Collusive Groups on Twitter”. Journal of Cybersecurity 9, no. 1: tyad014. doi.org/10.1093/cybsec/ DOI: https://doi.org/10.1093/cybsec/tyad014

tyad014.

Intelligence, Microsoft Threat. 2022. “Microsoft Investigates Iranian Attacks against the Albanian Government”. Microsoft Security Blog (September). www.mi-crosoft.com/en-us/security/blog/2022/09/08/microsoft-investigates-iranian--attacks-against-the-albanian-government/.

Intrusion Truth. 2017. intrusiontruth.wordpress.com/.

IT Army of Ukraine. 2022. t.me/itarmyofukraine2022.

Jenkins, Luke, Emiel Haeghebaert, Ben Read, and Alice Revelli. 2022. “Roadsweep Ransomware Targets the Albanian Government”. cloud.google.com/blog/topics/threat-intelligence/likely-iranian-threat-actor-conducts-politically-motivated-disruptive-activity-against/.

Jofre, TZVI. 2020. “Hezbollah-Affiliated Financial Org Hacked, InformationLeaked”. The Jerusalem Post (December). www.jpost.com/breaking-news/hezbol-lah-affiliated-financial-org-hacked-information-leaked-653690.

Jordan, Tim. 2015. “Hacktivism: Operation Tunisia, Modular Tactics and Information Activism”. In Information Politics. Liberation and Exploitation in the Digital Society. Pluto Press. doi.org/10.2307/j.ctt183p2xf.14.

Karagiannopoulos, Vasileios. 2018. Living With Hacktivism. Springer International Publishing. link.springer.com/10.1007/978-3-319-71758-6. DOI: https://doi.org/10.1007/978-3-319-71758-6

Karagiannopoulos, Vasileios. 2021. “A Short History of Hacktivism: Its Past and Present and What Can We Learn from It”. In Rethinking Cybercrime: Critical Debates, edited by Tim Owen and Jessica Marshall. Springer International Publishing. doi. DOI: https://doi.org/10.1007/978-3-030-55841-3_4

org/10.1007/978-3-030-55841-3_4.

Kausch, Kristina. 2017. “Cheap Havoc: How Cyber-Geopolitics Will Destabilize the Middle East”. www.gmfus.org/news/cheap-havoc-how-cyber-geopolitics-will-destabilize-middle-east.

Keller, Max Fisher, Jared. 2011. The Atlantic (August). www.theatlantic.com/in-ternational/archive/2011/08/syrias-digital-counter-revolutionaries/244382/.

Klein, Adam G. 2015. “Vigilante Media: Unveiling Anonymous and the Hacktivist Persona in the Global Press”. Communication Monographs 82, no. 33: 379–401. doi.org/10.1080/03637751.2015.1030682. DOI: https://doi.org/10.1080/03637751.2015.1030682

Kostyuk, Nadiya, and Yuri M. Zhukov. 2019. “Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?” Journal of Conflict Resolution 63, no. 2: 317–47.doi.org/10.1177/0022002717737138. DOI: https://doi.org/10.1177/0022002717737138

Leyden, John. 2010. “4chan Launches DDoS against Entertainment Industry”.

www.theregister.com/2010/09/20/4chan_ddos_mpaa_riaa/.

Mandiant. 2022. “Hacktivists Collaborate with GRU-Sponsored Threat Actors”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/gru-rise-telegram-minions.

Mandiant. 2023. “The GRU’s Disruptive Playbook”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/gru-disruptive-playbook.

Mandiant. 2023b. “KillNet Showcases New Capabilities While Repeating Older Tactics”. Google Cloud Blog. cloud.google.com/blog/topics/threat-intelligence/killnet-new-capabilities-older-tactics.

Marczak, Bill and John Scott-Railton. 2016. “The Million Dollar Dissident: NSO Group’s iPhone Zero-Days Used against a UAE Human Rights Defender”. Citizen Lab Research Report no. 78. University of Toronto. citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/.

Marczak, Bill, John Scott-Railton, Adam Senft, Irene Poetranto, and Sarah McKune. 2015. “Mapping FinFisher’s Continuing Proliferation”. Citizen Lab Research Report no. 64. University of Toronto. citizenlab.ca/2015/10/mapping-finfishers-continuing-proliferation/.

Maurer, Tim. 2018. Cyber Mercenaries: The State, Hackers, and Power. Cambridge University Press. www.cambridge.org/core/books/cyber-mercenaries/B685B7555E1C52FBE5DFE6F6594A1C00.

Milone, Mark. 2003. “Hacktivism: Securing the National Infrastructure”.Knowledge, Technology & Policy 16, no. 1: 75–103. doi.org/10.1007/s12130-003-1017-5. DOI: https://doi.org/10.1007/s12130-003-1017-5

Mueller, Robert S. 2019. “Report on the Investigation into Russian Interference in the 2016 Presidential Election”. www.justice.gov/archives/sco/file/1373816/dl.

Nakashima, Ellen and Shane Harris. 2018. “How the Russians Hacked the DNC and Passed Its Emails to WikiLeaks”. The Washington Post. www.washingtonpost. com/world/national-security/how-the-russians-hacked-the-dnc-and-passed-it-s-emails-to wikileaks/2018/07/13/af19a828-86c3-11e8-8553-a3ce89036c78_story.html.

Naprys, Ernestas. 2024. “Belarusian KGB Allegedly Breached, Hackers Dox over 8600 Agents”. Cybernews (April). cybernews.com/news/belarusian-kgb-allege-dly-breached-cyber-partisans/.

Natto Thoughts. 2024. “Intrusion Truth Methods: How Can They Get It Right Again and Again?” Substack newsletter. Natto Thoughts (April). nattothoughts.substack.com/p/intrusion-truth-methods-how-can-they.

Novetta. 2016. “Operation Blockbuster: Unraveling the Long Thread of the Sony Attack”. Docslib. docslib.org/doc/5282771/operation-blockbuster-unraveling-the-long-thread-of-the-sony-attack-3-caveats.

Olson, Parmy. 2013. We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Reprint edition. Back Bay Books.

Perlroth, Nicole, and David E. Sanger. 2017. “Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool”. World. The New York Times (May). www.nytimes.com/2017/05/12/world/europe/uk-national-health-service-cyberattack.html.

Privacy International. 2018. The Global Surveillance Industry. privacyinternational.org/explainer/1632/global-surveillance-industry.

Rader and Wash. 2015. “Identifying patterns in informal sources of security information”. Journal of Cybersecurity 1, no. 1: 121–44. doi.org/10.1093/cybsec/tyv008 DOI: https://doi.org/10.1093/cybsec/tyv008

RecordedFuture. 2015. Cyber Berkut Graduates From DDoS Stunts to Purveyor of Cyber Attack Tools. www.recordedfuture.com/blog/cyber-berkut-analysis.

Rid, Thomas. 2016. “All Signs Point to Russia Being Behind the DNC Hack”. VICE (July). www.vice.com/en/article/all-signs-point-to-russia-being-behind-the-dnc-hack/.

Rid, Thomas. 2017. “Disinformation: A Primer In Russian Active Measures And Influence Campaigns Panel II”. Select Committee on Intelligence. www.govinfo. gov/content/pkg/CHRG-115shrg25998/html/CHRG-115shrg25998.htm.

Roberts, Paul. 2010. “Attacks On MPAA’s UK Law Firm Lead to Data Leaks, Lawsuit”. Threatpost. threatpost.com/attacks-mpaas-uk-law-firm-lead-data-leaks-lawsuit-092710/74517/.

Romagna, Marco. 2020. “Hacktivism: Conceptualization, Techniques, and Historical View”. In The Palgrave Handbook of International Cybercrime and Cyberdeviance, edited by Thomas J. Holt and Adam M. Bossler. Springer International Publishing. doi.org/10.1007/978-3-319-78440-3_34. DOI: https://doi.org/10.1007/978-3-319-78440-3_34

Samuel, Alexandra Whitney. 2004. Hacktivism and the Future of Political Participation. Harvard University. Sauter, Molly. 2014. The Coming Swarm : DDoS Actions, Hacktivism, and Civil Disobedience on the Internet. Bloomsbury Academic.

Schneier, Bruce. 2017. “Who Are the Shadow Brokers?” Schneier on Security (May). www.schneier.com/blog/archives/2017/05/who_are_the_sha.html.

Seblani, Sana. 2021. Lebanon: The Hacking of Hezbollah’s Al-Qard Al-Hasan and US Sanctions. daraj.media/en/lebanon-the-hacking-of-hezbollahs-al-qard-al-ha-san-and-us-sanctions/.

Shehabat, Ahmad. 2012. The Social Media Cyber-War: The Unfolding Events in the

Syrian Revolution 2011, no. 6: 2. www.hca.westernsydney.edu.au/gmjau/archive/v6_2012_2/ahmad_shehabat%20_RA.html.

Sigholm, Johan. 2016. “Non-State Actors in Cyberspace Operations”. Journal of Military Studies 4, no. 1: 1–37. doi.org/10.1515/jms-2016-0184. DOI: https://doi.org/10.1515/jms-2016-0184

Siqi, Cao. 2023. Exclusive: Hacker Group with Members from Europe, North AmericaFound to Have Launched Cyberattacks against China. www.globaltimes.cn/page/202302/1285744.shtml.

Soesanto, Stefan. 2022. “The IT Army of Ukraine”. Center for Security Studies (June). css.ethz.ch/en/center/CSS-news/2022/06/the-it-army-of-ukraine.html.

Streams, Kimber. 2012. “Anonymous “Operation Payback” Hackers Convicted for Costly DDoS Attacks”. The Verge (December). www.theverge.com/2012/12/6/3735622/anonymous-conviction-christopher-weatherhead-operation-payback.

Suiche, Matt. 2017. “Lessons from TV5Monde 2015 Hack”. Comae Technologies (June). medium.com/comae/lessons-from-tv5monde-2015-hack-c4d62f07849d.

Taylor, Paul A. 2005. “From Hackers to Hacktivists: Speed Bumps on the Global Superhighway?” New Media & Society 7, no. 5: 625–46. doi.org/10.1177/1461444805056009. DOI: https://doi.org/10.1177/1461444805056009

Threat Hunter Team. 2018. Shamoon: Destructive Threat Re-Emerges with New Sting in Its Tail. www.security.com/threat-intelligence/shamoon-destructive-threat-re-emerges-new-sting-its-tail.

ThreatConnect. 2016a. “Guccifer 2.0: The Man, the Myth, the Legend?” ThreatConnect (July). threatconnect.com/blog/guccifer-2-0-the-man-the-myth-the-legend/.

ThreatConnect. 2016b. “Hacktivists vs Faketivists: Fancy Bears in Disguise”. ThreatConnect (December). threatconnect.com/blog/faketivist-vs-hacktivist-how-they-differ-2/.

Tripwire. 2016. Shadow Brokers Leaks Dilemma – History of Events Explained. www.tripwire.com/state-of-security/shadow-brokers-leaks-dilemma-history-e-vents-explained.

Ukrainian Ministry of Digiral Transformation. 2022. Ukraine Ministry of Digiral Transformation: IT Army Blocks Russian Sites in a Few Minutes — the Main Victories of Ukraine on the Cyber Front. www.kmu.gov.ua/en/news/mincifri-it-armiya-blokuye-rosijski-sajti-za-dekilka-hvilin-golovni-peremogi-ukrayini-na-kiberfronti.

United States Department of Justice. 2018a. Park Jin Hyok — Complaint. www. justice.gov/usao-cdca/press-release/file/1091951.

United States Department of Justice. 2018b. U.S. Charges Russian GRU Officers with International Hacking and Related Influence and Disinformation Operations (October). www.justice.gov/opa/pr/us-charges-russian-gru-officers-international-hacking-and-related-influence-and.

United States Department of Justice. 2019. English: U.S. v. Viktor Borisovich Netyksho (Case 1:18-Cr-215) Indictment Filed by the Mueller Investigation (July). www.justice.gov/file/1080281/download. commons.wikimedia.org/wiki/File:U.S._v._Viktor_Borisovich_Netyksho,_et_al,_Indictment.pdf.

Vijayan, Jai. 2019. Data Dump Purportedly Reveals Details on Previously Unknown Iranian Threat Group. www.darkreading.com/cyberattacks-data-breaches/data-dump-purportedly-reveals-details-on-previously-unknown-iranian-threat-group.

WADA. 2016. “Cyber Security Update: WADA’s Incident Response”. World AntiDoping Agency (October). www.wada-ama.org/en/news/cyber-security-update-wadas-incident-response.

Wes. 2024. “Phineas Fisher: The World’s Hacktivist”. Medium (November). medium.com/@phishfinding/phineas-fisher-the-worlds-hacktivist-483601802ca8.

WikiLeaks. 2014. SpyFiles 4. wikileaks.org/spyfiles4/.WikiLeaks. 2015. The Hackingteam Archives. wikileaks.org/hackingteam/emails/.

Yemen Cyber Army. 2015. Yemen Cyber Army Announces Target List. cryptome.org/2015/07/yemen-cyber-army-targets.htm.

Zetter, Kim. 2014. “Sony Got Hacked Hard: What We Know and Don”t Know So Far”. Wired. www.wired.com/2014/12/sony-hack-what-we-know/.

Zetter, Kim. 2022a. “Intrusion Truth — Five Years of Naming and Shaming China’s Spies”. Zero Day (March). www.zetter-zeroday.com/interview-with-intrusion-truth/.

Zetter, Kim. 2022b. “Unmasking China’s State Hackers”. Zero Day (March). www.zetter-zeroday.com/unmasking-chinas-state-hackers/.

Publicado

2025-12-12

Cómo citar

Izycki, E., & Lavandoski da Silva, L. G. (2025). ¿Existe realmente el hacktivismo genuino?. Revista Brasileira De Estudos De Defesa, 12(1), e025020, p. 1–43. https://doi.org/10.26792/rbed.v12i1.75460

Número

Sección

Artigos