DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

GhostShell, On the Record – Why did he really disappear in 2013?

Posted on March 15, 2016 by Dissent

This post is part of an extended interview conducted by DataBreaches.net and CyberWarNews.info with the hacker formerly known as “GhostShell.”

In a March, 2013 interview with Eduoard Kovacs, GhostShell was asked whether he was taking a break from hacking and whether it was because of law enforcement. GS answered him at the time:

I’m taking a break from the public sector. I’m not sure when or if I’ll be back. I’m closing up all the accounts from Team GhostShell to its branches, Midas Bank and Ophius Lab for the time being.

As we reported in our article doxing him, TGS may not have been in the public eye, but it was still engaged in projects and operations, according to GhostShell. But the reasons for the disappearance from public space were somewhat complex:

The choice I made back then was the right one. Immediately as I saw the group being discredited I knew I had to stop, make a public farewell and just drop all activity related to the group. I wasn’t gonna let the feds destroy every shred of credibility I built up until then. So I cut my losses in a way and accepted all the successful projects we managed to put out.

That answer may sound good, but there was a lot of turmoil associated with it, as GS told us during another exchange:

At the end of 2012 things were heating up. It was right after Project WhiteFox happened. There were officials saying I’m dangerous, there were new groups coming out following my type of rules and fashion, random people on forums saying Team GhostShell was Anonymous 2.0 and so on. I just had this feeling that it went past a point where I never was in before.

And then I felt it. It was probably the third time in my life when this happened. I felt like I was being hunted. It’s the most psychedelic feeling you can have. Adrenaline rushing in and you can’t control yourself with excitement. For some reason I couldn’t stop laughing.

I knew something was about to go down. And then I saw it. Paste sites, the same ones that I was using for months, the same ones that kept deleting my pastes after being called by the police were closing their sites, locking them. The hijacked twitter accounts that I was using got suspended after so many months of using them. The journos, bloggers, that I was talking to stopped replying back. And the overly excited anons that wanted me to work on a project related to South Africa. It was Christmas all over again for me. I couldn’t stop laughing, I couldn’t stop smiling. I couldn’t stop, period. I wanted to see what was going to happen, how would they fight me? I couldn’t wait to see it. That month in SA cyberspace was the longest. Slow connections and sketchy networks filled with private information disappearing overnight. I lost at some point over 700k NDA accounts.

But when I finally got to the end, the anons disappeared, the hijacked accounts were no more, the pastebin sites closed, the journos silent. And even then I didn’t realise the obvious. That this technique was nothing special but rather the same one they’ve been using for years on groups like TeamPoison and RedHack.

It only came to me when I saw the end result, anonfeds using the media to discredit TGS, and bully all the ones that were reporting about it. Some were so scared of the threats that ended up posting the entire email conversations with them. Others told me in private. This is why media freedom is a myth. It’s all political. You either get with the program or you’re out. The thing that got me the most was that I knew every single one of those anonfeds from the same networks I was hanging on.

Whew.

Well, that clears that up. Although it really doesn’t, because according to GhostShell, he continued hacking and undertook some mammoth projects, although we do not know how far he progressed with them, or if they will ever be confirmed with proof. At various points, he told us about #OpRotherham, which he did under the Anonymous banner, and other projects that were never made public:

If I had to choose a favourite project it would be either Project ScarletHowl or Project FrostOwl. No one from the public sector knows them but they are the largest and longest running campaigns I’ve done throughout these past 4-5 years. Let me put it to you this way, Dark Hacktivism was created from them and the leaks that came along with it, both the around one thousand websites leaked and the private data given to one of my japanese contacts to deliver to the government represent a fraction of data obtained from these projects. One of the campaigns lasted over 8 months non-stop hacking.

[…]

Project ScarletHowl had one objective, to attack and breach every single website from the top 1 million.

Project FrostOwl’s main purpose was to map out and get as much information out of Asia’s cyberspace. Every single country was targeted.

Bits and pieces of these projects were used for Dark Hacktivism.

There are a lot more but these would be my highlights. Also an interesting fact, Project Alkonost used to be about cryptanalysis or even cryptology in general but I went with it in a different direction.

Interview Topics:

  • #OpRomania
  • Anonymous
  • MalSec
  • “Team” GhostShell?
  • More on Snitches, the Feds, and the Scene
  • Why did he really disappear in 2013?
  • On criticisms of “simple” hacks
  • Psychological Factors
  • Difficulty Finding Work and Risk of Arrest
  • If You Knew Then What You Know Now….

Related:

  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • KT Chief to Resign After Cybersecurity Breach Resolution
  • Cyber-Attack On Bectu’s Parent Union Sparks UK National Security Concerns
  • A business's cyber insurance policy included ransom coverage, but when they needed it, the insurer refused to pay. Why?
  • Before Their Telegram Channel Was Banned Again, ScatteredLAPSUS$Hunters Dropped Files Doxing Government Employees (2)
  • Attorney General James Secures $14.2 Million from Car Insurance Companies Over Data Breaches
Category: Breach Incidents

Post navigation

← GhostShell, On the Record – Snitches, Feds, and the Scene
GhostShell, On the Record – On criticisms of “simple” hacks →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Report released on PowerSchool cyber attack
  • Sue The Hackers – Google Sues Over Phishing as a Service
  • Princeton University Data Breach Impacts Alumni, Students, Employees
  • Eurofiber admits crooks swiped data from French unit after cyberattack
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • French agency Pajemploi reports data breach affecting 1.2M people
  • From bad to worse: Doctor Alliance hacked again by same threat actor (1)
  • Surveillance tech provider Protei was hacked, its data stolen, and its website defaced
  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • CIPL Publishes Discussion Paper Comparing U.S. State Privacy Law Definitions of Personal Data and Sensitive Data
  • India’s Digital Personal Data Protection Act 2023 brought into force
  • Five major changes to the regulation of cybersecurity in the UK under the Cyber Security and Resilience Bill
  • Keeping Cool When ICE Arrives: Basic Raid Response Strategies for Laboratories
  • IRS Accessed Massive Database of Americans Flights Without a Warrant

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.