Friend
Professional
- Messages
- 2,669
- Reaction score
- 943
- Points
- 113
Why claims of hacking are not true.
Recently, a new actor under the pseudonym "Hikki-Chan" appeared in hacker forums, who quickly attracted attention, claiming responsibility for high-profile cyberattacks. However, a detailed analysis of his statements shows that this character is likely a fraud who is trying to take advantage of the current geopolitical tensions to build a reputation for himself.
One of the key arguments on which Hikki-Chan builds its popularity is an alleged data leak from the popular Russian social network VK. But when checked, it turned out that the "leak" consisted of publicly available information collected from users' public pages. This technique is often used by fraudsters to present the available data as the result of a hack, thus increasing their visibility in hacker communities.
Hikki-Chan also tried to claim responsibility for the attack on the Israeli transport company Kavim, which was actually carried out by the Black Shadow group in 2021. The attempt to attribute this attack raises serious doubts about the veracity of the rest of his statements.
Another high-profile claim of Hikki-Chan was a statement about the hacking of the database of the Israeli police, but it turned out that the data presented refers to a youth organization engaged in preparing teenagers for military service. This data had already appeared on hacker forums in June 2023, indicating that old leaks were being used to create the appearance of new attacks.
Research suggests that state-sponsored groups, such as Iranian APT groups, may be behind such cyber operations, using similar techniques to conduct psychological operations. They distribute fake or outdated databases to create the illusion of successful attacks and destabilize the situation, sow distrust and undermine Israel's cybersecurity reputation.
Hikki-Chan's activities should be seen as part of a broader disinformation campaign aimed at creating the appearance of successful cyberattacks.
Source
Recently, a new actor under the pseudonym "Hikki-Chan" appeared in hacker forums, who quickly attracted attention, claiming responsibility for high-profile cyberattacks. However, a detailed analysis of his statements shows that this character is likely a fraud who is trying to take advantage of the current geopolitical tensions to build a reputation for himself.
One of the key arguments on which Hikki-Chan builds its popularity is an alleged data leak from the popular Russian social network VK. But when checked, it turned out that the "leak" consisted of publicly available information collected from users' public pages. This technique is often used by fraudsters to present the available data as the result of a hack, thus increasing their visibility in hacker communities.
Hikki-Chan also tried to claim responsibility for the attack on the Israeli transport company Kavim, which was actually carried out by the Black Shadow group in 2021. The attempt to attribute this attack raises serious doubts about the veracity of the rest of his statements.
Another high-profile claim of Hikki-Chan was a statement about the hacking of the database of the Israeli police, but it turned out that the data presented refers to a youth organization engaged in preparing teenagers for military service. This data had already appeared on hacker forums in June 2023, indicating that old leaks were being used to create the appearance of new attacks.
Research suggests that state-sponsored groups, such as Iranian APT groups, may be behind such cyber operations, using similar techniques to conduct psychological operations. They distribute fake or outdated databases to create the illusion of successful attacks and destabilize the situation, sow distrust and undermine Israel's cybersecurity reputation.
Hikki-Chan's activities should be seen as part of a broader disinformation campaign aimed at creating the appearance of successful cyberattacks.
Source