In a alarming incident, the hacker group GlorySec has revealed their latest cyber operation, targeting companies in Guyana City, Venezuela. The group claims to have deployed worm-type malware via USB sticks, resulting in the infiltration of over 100 companies’ systems. This marks a significant escalation in GlorySec’s activities as they continue to expand their influence and test new capabilities.
According to GlorySec’s statement, their malware has successfully spread across numerous companies, enabling a complete system takeover and granting access to personal PCs. The group has even posted proof of their actions on their storage channel, showcasing screenshots from a compromised PC named “KingBike.”
In their communication, GlorySec emphasized their intent behind this operation—to test the limits of their new malware without causing significant harm, yet demonstrating its reach and capabilities. The group also declared their political motivation, aiming to destabilize the regime of Venezuelan President Nicolás Maduro.
Potential Future Operations in Russia
GlorySec also hinted at a possible deployment of their worm in Russia, contingent on the escalation of the Russo-Ukrainian war and direct involvement of the United States. This potential operation underscores the group’s strategic focus on high-stakes geopolitical conflicts and their readiness to exploit such situations to test and demonstrate their cyber warfare tools.
The post GlorySec Launches Malware Attack in Venezuela and Hints at Future Operations in Russia appeared first on Daily Dark Web.