OpKillingBay Update


November 30, 2015 02:00 PM

Background

OpKillingBay, the annual campaign created by Anonymous, has continued into November and predicted to remain until the end of dolphin hunting season. Since our first alert, TeamRekt has continued to persistently attack targets for OpWhales, OpSeaWorld, and OpKillingBay.

A new member to TeamRekt, @teamrektit, has targeted a staggering 14 sites under OpSeaWorld and OpKillingBay since November 21.

On November 13, OpSeaWorld celebrated its first year of operation. Over the last year it launched a TweetStorm featuring pre-scripted tweets and has been included in a number of OpKillingBay attacks. OpWhales, OpSeaWorld, and OpKillingBay have worked together for the group TeamRekt.

Since October, OpKillingBay, OpSeaWorld and OpWhales targeted a number of industries including:

  • Tourism
  • Transportation
  • Media
  • Telecommunication
  • Government

Since our alert on October 23, TeamRekt targeted dozens of sites across three different operations.

We continue to see denial of service attacks, data dumps and service outages caused by these campaigns as OpKillingBay, OpSeaWorld and OpWhales target a number of industries directly and indirectly related to the hunting of dolphins and whales.

Additional Information

For additional information regarding the threat, read the full Threat Alert.

Download Now

Contact Radware Sales

Our experts will answer your questions, assess your needs, and help you understand which products are best for your business.

Already a Customer?

We’re ready to help, whether you need support, additional services, or answers to your questions about our products and solutions.

Locations
Get Answers Now from KnowledgeBase
Get Free Online Product Training
Engage with Radware Technical Support
Join the Radware Customer Program

Get Social

Connect with experts and join the conversation about Radware technologies.

Blog
Security Research Center
CyberPedia