Amid the political tension related to the heinous acts of Belarus authoritarian government, a report surfaced from an alleged hacking group claiming that they had accessed a database with information on all those individuals crossing the country’s borders, including President Alexander Lukashenko and alleged secret agents.
Since Lukashenko’s controversial victory, a hacking group calling itself Belarus Cyber-Palistans began deploying cyberattacks against multiple public organizations. Cybersecurity specialists believe that this group is not just a set of amateurs, but is made up of professional hackers.
On the latest attack, threat actors claim to have compromised a database with information on all entries and exits to the country in the last two weeks. This database includes information on Belarusian citizens and foreigners who have crossed borders by plane, road, and train or on foot.
On previous occasions, leaks stemming from the group’s attacks were instrumental in establishing international sanctions against the local government. For example, Belarus Cyber-Palistans managed to expose CCTV footage and the employment history of some officers and members of the political party under command, as well as exposing the wiretap that some opponents of the regime witnessed.
This group also managed to access the personal data of every Belarusian citizen, including passport registration, address and place of work, not to mention that reports were included about people potentially opposed to the Lukashenko regime.
In addition to the authoritarian regime, there is a migration crisis on the Belarusian border with Poland from which new sanctions could result for the Lukashenko government. Cybersecurity experts believe the records revealed by hackers could put even more pressure on the Belarusian government.
To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.
He is a cyber security and malware researcher. He studied Computer Science and started working as a cyber security analyst in 2006. He is actively working as an cyber security investigator. He also worked for different security companies. His everyday job includes researching about new cyber security incidents. Also he has deep level of knowledge in enterprise security implementation.