Pro-Cambodian hacktivists launch attacks on Thai government sites amid border dispute

Avatar

A Cambodian hacktivist group has ramped up cyberattacks against Thai entities following a flare-up in a long-running dispute between the two countries over contested border areas. 

The AnonsecKh group, which goes by Bl4ckCyb3r on Telegram, claimed at least 73 attacks on Thai organizations in the two weeks following a May 28 incident in which a Cambodian soldier was killed in a skirmish with Thai forces, the cybersecurity company Radware said

The countries have for decades disagreed over ownership of pockets of land along their 500-mile border, with the 11th-century Preah Vihear Temple the flashpoint of the conflict. The United Nations International Court of Justice has ruled multiple times that the complex belongs to Cambodia.

The hacktivist group first claimed attacks on Thai government websites in March, and expanded their scope to Thai academic and private-sector entities that same month. 

Their attacks typically involve distributed denial-of-service (DDoS) campaigns, which flood and often paralyze targeted servers with traffic, as well as defacement. The group reportedly increased its activity after a statement from the Thai army on June 6 that it is “now ready for a high-level military operation.”

Almost half of the observed incidents involve Thai government or military websites, while manufacturing companies account for more than a quarter of claimed targets.

According to the cyber analysis site Hackmanac, between June 4 and June 10 the group claimed to target the Thai Ministry of Defense, Ministry of Foreign Affairs and the Bangkok Metropolitan Administration, among others.  

Last week, officials from Thailand’s Cyber Crime Investigation Bureau (CCIB) reportedly said the hacking group was threatening government entities and that a court had approved two arrest warrants for alleged members who they are trying to identify and detain.

CybercrimeGovernmentNewsNews Briefs
Get more insights with the

Recorded Future

Intelligence Cloud.

Learn more.

No previous article

No new articles

James Reddick

has worked as a journalist around the world, including in Lebanon and in Cambodia, where he was Deputy Managing Editor of The Phnom Penh Post. He is also a radio and podcast producer for outlets like Snap Judgment.

 

Total
0
Shares
Previous Post

Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper Backdoor

Next Post

Scattered Spider hackers targeting insurance industry following retail hits, Google warns

Related Posts

Go-Based Malware Deploys XMRig Miner on Linux Hosts via Redis Configuration Abuse

Cybersecurity researchers are calling attention to a new Linux cryptojacking campaign that's targeting publicly accessible Redis servers. The malicious activity has been codenamed RedisRaider by Datadog Security Labs. "RedisRaider aggressively scans randomized portions of the IPv4 space and uses legitimate Redis configuration commands to execute malicious cron jobs on vulnerable systems,"
Avatar
Read More

Playbook: Transforming Your Cybersecurity Practice Into An MRR Machine

Introduction The cybersecurity landscape is evolving rapidly, and so are the cyber needs of organizations worldwide. While businesses face mounting pressure from regulators, insurers, and rising threats, many still treat cybersecurity as an afterthought. As a result, providers may struggle to move beyond tactical services like one-off assessments or compliance checklists, and demonstrate
Avatar
Read More