History of Hacktivism in China – 1998 Indonesia Riots (Chinese Patriotic Cyberwars)

Introduction

In May of 1998 unrest broke out on University campuses in the Indonesia city of Medan, protests had been ongoing but the death of a student that was blamed on security forces added fuel to the fire.

The Indonesia economy back then was devastated by the Asian Financial Crisis, the government was accused of intense corruption and there were food shortages and mass unemployment.

All of this was in the foreground, in the background was endemic discrimination and prejudice against ethnic Chinese people within Indonesian society dating back decades and decades.

When the protests turned into riots it was the ethnic Chinese community that bore the brunt of anger and violence, with 168 rapes recorded along with murder, violent attacks and looting of ethnic Chinese businesses and homes.

It is not the focus of this blog but it is interesting to note that some observers back in 1998 pinpointed the internet itself as one of the driving forces behind the initial riots in Indonesia.

I have made extensive usage of news articles, books and blogs in writing this, in some cases I have had to translate from Chinese to English using automated online services. I’ve done my best to note where these translations have taken place.

I recommend two different books if you want to better understand the origins and nature of Chinese hacktivism, these are The Dark Visitor: Inside the World of Chinese Hackers by Scott J. Henderson and Chinese Cyber Nationalism by Xu Wu.

It is well beyond the scope of this blog but it is interesting to note that some of the core members of groups involved in these early years of Chinese hacktivism have gone on to be accused of links to China’s current government backed APT hacking groups. One member in particular, coldface, who was a foundational member of a group we will be discussing in this blog, the Green Army, was indicted this year (2025) by U.S. authorities for his alleged involvement with APT27 intrusions into U.S. systems.

The Green Army

The Green Army, or Green Corps (绿色兵团), was founded in 1997 by a Shanghai based hacker known as goodwill, it was China’s first major hacker community and created to pursue the principles of “freedom, equality, and sharing”. This early community was explicitly founded around non-political ideals of knowledge sharing, peacefulness and cooperation. By 1998 the Green Army community numbered in the thousands.

I have tried to learn more about hacking in China before the patriotic cyberwars era, there certainly were some cases of data theft, fraud and website defacement but documentation of any of it is very slim.

The Nation, 13th of July, 1998

It makes sense to me, and has been observed by other writer and some of the hackers involved themselves, that if the Chinese authorities were fearful of hackers then hackers championing Chinese patriotism and attacking perceived enemies of China must have gone a long way to shield them from repercussions. These self styled patriotic hackers called themselves “hong-ke”, which literally means “red guest” as opposed to “hei-ke” which means “black guest.” Red here is of course the color associated with the Chinese flag, so these red hackers were distancing themselves from the perceived criminal element in the Chinese computer underground at the time.

Old school Chinese hacker Wu Hanqing termed this time, from 1994 through to 1998, as China’s hacker Enlightenment Era, when people were motivated by curiosity and a love of technology without any malicious intent. What was to follow he called the Golden Age, the period in which nationalist fervour overtook the hacking scene in China and the Chinese public became fascinated with the exploits of home grown hackers.

China’s Internet in 1998

The internet had reached China in 1994 but by 1998 it is estimated only 0.2% of people were online, compared to an estimate of 30% adoption in the United States. Chinese colleges or universities were a place where people could more easily use computers and access computer networks, including the internet.

Reading account of events from 1998 it is very obvious that this first generation of Chinese hackers were, in general, older than the equivalent first generations of hackers in countries like America.

Chinese hackers realized that they could use their internet access and computer skills to assert themselves and bypass the Chinese government, to make their voices heard directly on the international stage.

“Fundamentally, the methods used by cyber hackers are no different from those used by college students to throw rocks and ink bottles at the U.S. Embassy. It’s just a means of venting, not an attempt at aggression,” said Min Dahong, a professor at the Institute of Journalism and Communication of the Chinese Academy of Sciences.

“Before 1998, in every major event that occurred in China, the only voice that could be heard abroad was the official Chinese voice. But after the anti-Chinese wave in Indonesia, Chinese netizens used their actions to convey their voices directly to the people they wanted to reach,” said Min Dahong.

The fleeting passion of hacker culture, http://www.sina.com.cn, March 9th, 2005 (translated by Google)

The Chinese government was not willing to countenance physical protests, even against the governments of other nations, in case those protests were to turn against the Chinese government itself. The internet then provided idealistic and outraged students an outlet to demonstrate the depth of their anger while avoiding making themselves obvious targets for a repressive government at home. The spectre of Tiananmen loomed less large on student BBSes.

The Passionate Era of Chinese Hacktivism Begins

It took three months for photos, news and accounts of the violence committed against ethnic Chinese Indonesians to reach the Chinese internet of 1998. When the nascent hacker scene in China became aware of what had transpired it transformed the hacking scene there and set into motion what became the first of “six cyber wars”.

Numerous Chinese women were brutally raped and murdered, Chinese supermarkets were looted, and many inhumane Indonesian anti-Chinese elements posted numerous images of Chinese people being brutally assaulted online. This series of actions infuriated the nascent Chinese hackers, who spontaneously gathered in IRC chat rooms and, in groups of eight to six, spammed Indonesian government websites and used ping attacks. These seemingly naive attack methods forged the initial unity and tenacity of Chinese hackers, laying the foundation for the later formation of the “Red Hacker” movement. .

Essential Cybersecurity Top-Secret Analysis: The X-Files of Chinese Hackers – Chapter 3, September 2009 (translated by Google)

On Friday, August 7th 1998 tokobudi.co.id was hacked by Chinese hacktivists and an accompanying post was made on a ChinaByte discussion forum. ChinaByte had been founded the previous year and was China’s first IT news portal. The post about the Indonesian government website defacement had caught the attention of a ChinaByte editor who then included the url of the defaced site and a few lines about the hack in an email newsletter sent out to tens of thousands of subscribers.

The Green Army were about to transform from a curiosity driven loose collective into a hacktivist fighting force.

This was the start of what was known in Chinese hacking circles back in the early 2000s as the first of six patriotic hacktivist “cyber wars” that were to take place between 1998 and 2001.

Defacement of tokobudi.co.id, August 7th, 1998

Sunday the 9th of August saw a further Indonesian website defacement, this time http://www.vsi.dpe.go.id, a government site.

Defacement of http://www.vsi.dpe.go.id, August 9th, 1998

The lengthy text of the defacement included the following poem:

A meteor streaks across the sky, fleeting and ephemeral,
Is it the crystalline tear of a falling petal?
Such beautiful flowers, cut down so cruelly by vile hands?
Simply because they share a common name: “Chinese”?

A meteor streaks across the sky, fleeting and brief,
Is it the fiery blossoms welcomed by angels?
Such young bodies, reduced to ashes in the flames of evil?
Simply because they share a common name: “Chinese”?

A meteor streaks across the sky, fleeting and brief,
Is it the cold gleam of a vengeful crescent moon?
Such crimson blood must not flow in vain on that filthy land!
Simply because we share a common name: “Chinese”!

Translated by Google from defacement of http://www.vsi.dpe.go.id, August 9th, 1998

The same defacement also included the exhortation “let us, China’s hackers, teach these barbaric outsiders a lesson”. Many hackers were to answer this call to arms. You can find archives of these early defacements here, many other defacements by Chinese hacktivists from around this time have proven impossible for me to track down, along with coverage on sites like ChinaByte.

On Monday the 10th of August news of the hacking of these Indonesian websites was on the front page of ChinaByte with a headline that read roughly “Indonesian anti-Chinese violence angers Chinese hackers”, and the subtitle “Internet anger rises.”

At this point the more technical portion of China’s online population, the exact people who would frequent a tech news site, were aware not only of the terrible events surrounding the riots in Indonesia back in May, but also that Chinese hackers were taking action to address the atrocities that were committed.

Second defacement of http://www.vsi.dpe.go.id

To rally more people to join the fight, several technical hackers spearheaded the formation of the “China Hacker Emergency Conference Center,” responsible for coordinating attacks on Indonesian websites. The anti-Chinese incidents in Indonesia inspired a large number of netizens to engage in hacking. Some returned to real life after the attacks, while others pursued their hacker ideals with unwavering dedication. This incident also made the hacker group “Green Army” famous on the Chinese internet, giving rise to the later “China United Green Alliance.”

Essential Cybersecurity Top-Secret Analysis: The X-Files of Chinese Hackers – Chapter 3, September 2009 (translated by Google)

The Green Army worked with other smaller Chinese hacker groups and the “China Hacker Emergency Conference Center” (“中国黑客紧急会议中心”) group was set up to coordinate attacks on Indonesia websites.

From here tactics ranged from website defacement to DoS and email bombing (flooding Indonesian government email inboxes with spam).

A list of 700 Indonesian government websites that were considered potential targets were circulated on Chinese university bulletin boards and IRC servers.

On 12 August 1998, an unnamed hacker posted in a
chat room “My experience of Chinese hackers’ attack on Indonesia’s websites,” she detailed how she wound up attacking the Indonesian government website at
http://www.dgtl.dpe.go.id.

That day, I entered the “home of hacker” BBS in the morning. After knowing some hackers had “blackened” Indonesia’s websites, I was so excited. There were more than 700 Indonesian government’s web addresses posted by “root.” I downloaded the addresses, and began to search for potential targets…. While using five computers to crack passwords, I logged on to the “home of hacker” BBS to look for help. I am not so familiar with “Unix,” so I asked a friend named “killer” to help me. She tried my passwords, and came back to me within five minutes. She told me that there was a big “bug” in the system that we could utilize. But, because the network in our city was so slow, we made an appointment to come back that evening at 10:30 PM. Another hacker “dreamy” agreed to design an English-version protest poster for us….

Chinese Cyber Nationalism: Evolution, Characteristics, and Implications by Wu Xu

The quote above matches roughly with information I found in an article from Chinese publication Computer News from 1998 in which a reporter spoke with a person on the Tsinghua University BBS who claimed to be hackers involved in the hack detailed above.

Are we a gang? First of all, we are not a gang. There were several of us: Xiaoqian (the Hunan female hacker) and I were responsible for the intrusion. Killers not only helped us crack the password but also provided all the hacked images. Ms. Dreamy was responsible for the content related to the “Letter to People of Conscience in Society.” But we are not a gang. We all met on the newsgroups and came together out of a sense of righteous indignation.
  Is Xiaoqian a novice? Xiaoqian is indeed a novice. However, she worked in telecommunications and was very familiar with networks. I remember that night, when we split up, she changed several accounts to superusers, giving us free access. She was surprised to find that she couldn’t log in directly as root remotely, but had to use the su command. (Perhaps she hadn’t read any hacking books, otherwise she would have known that to prevent hackers, most Unix systems don’t allow system administrators or superusers to log in directly remotely, requiring the su program.)
  My first attack: That morning, I had just joined the newsgroup and saw that someone had attacked an Indonesian website. I was very excited. Later, I saw someone post over 700 Indonesian URLs online, and I started looking for Indonesian websites that could be attacked.
  After a long test, I finally found a few that could be hacked. After logging in anonymously using FTP, I began cracking the passwords.
  After much effort, I managed to find 52 of the 54 valid passwords, excluding those for root and sysadmin. Cracking the remaining two accounts became the key.
  At 5 p.m., Xiaoqian showed up. She was quite knowledgeable about networking, and with her help, we cracked the other two passwords. Killers then told us he had system administrator privileges, free to do whatever he wanted. I immediately spent 10 minutes creating the homepage, but unfortunately, I wasn’t satisfied. By this time, I’d been online all day and was feeling a bit tired. We decided to officially change the homepage at 11:30 p.m.
   We reunited at 11:30 p.m., and thanks to our system administrator privileges, everything went smoothly. By the next morning, we were done.

“The news behind the “Chinese hacker” incident”, Huayin, Computer News (Issue 32, Page 17), 1998, (translated by Google)

Worth noting that based on both of these accounts there were women involved in both the hacking and creation of defacement pages for at least some of the Indonesia government sites.

I have found accounts on Chinese forums and blogs that claim to include quotes from an unnamed Indonesian government spokesperson on different dates in August, implying that the Chinese government was responsible for the attacks, I can’t find the actual source for this quote though so will not include it here. Supposedly there was a Voice of America report on Indonesian government reaction to the hacktivist attacks that went out on August 9th of 1998, if you have a copy of this please let me know.

Most accounts agree that the attacks on Indonesia peaked on August 17th, Indonesia’s Independence Day, with defacements and DoS attacks. It was after this that the Indonesia government began to implement blocking of Chinese IP addresses and improved defences, Chinese hackers began to gradually lose interest.

“This page is hacked for your national day. Please keep this page for 48 hours and punish the murderers in May immediately,”

Chinese protesters attack Indonesia through Net, BBC, Wednesday, August 19th, 1998

The Aftermath

Reading over accounts of the cyberattacks on Indonesia on Chinese forums or blogs it is apparent both how proud people are of the hacks but also how critical some of them are of specific aspects. Some accounts call out people who were simply hungry for internet fame and even people who registered Indonesian domains to then upload fake defacements, a tactic that also saw some popularity during the middle period of Anonymous.

when the country was still weak and hiding its strength, this was the first public appearance of Chinese hackers, the first group of Chinese keyboard warriors. In the invisible battlefield of cyberspace, this group expressed their deep love for their fellow Chinese and their motherland in their own way. They exemplified the chivalrous spirit and restrained elegance of China’s cybersecurity, as well as their passionate and patriotic spirit.

Chinese hackers realized that they could wield influence and gain notoriety by taking on China’s enemies, some of the people involved in these early patriotic cyberwars are still infosec celebrities in China.

The cyberwars became as much about defending the dignity of China itself as it was about attacking perceived enemies, the hackers involved were desperate to prove that China would not be humiliated on the international arena.

A year after the cyberwar between Chinese and Indonesian hackers ended there were print publications in China dedicated to hacking, many of which lasted into the early 2010s. While hacker culture blossomed in some ways the Chinese state was to intervene a few years down the line to persuade fervently patriotic hackers to not take actions that might embarrass the government.

The Green Army fell apart in the early 2000s due to conflicts over rights to the name of the group when members in different cities decided to found cybersecurity companies. Factions in Shanghai and Beijing split acrimoniously.

#1998 #BBS #China #ChinaUnitedGreenAlliance #ChinaByte #ChineseHackerEmergencyConferenceCenter #coldface #cyberwar #绿色兵团 #绿色军团 #黑客 #goodwell #GreenArmy #GreenCorps #GreenLegion #hacker #hackers #hacking #heiKe #history #hongKe #Hongke #Hongker #Honker #HonkerUnion #Indonesia #IRC #May #Peristiwa98 #riot #Tragedi1998 #中国黑客紧急会议中心

“Yugoslav hackers hit NATO Web site” – The Philadelphia Inquirer, Thursday April 1st, 1999

On April 3rd 1999 Ashley Dunn, writing in the Los Angeles Times, described how the Kosovo War was “turning cyberspace into an ethereal war zone where the battle for the hearts and minds is being waged through the use of electronic images, online discussion group postings, and hacking attacks.”

The Kosovo War lasted from February 1998 through to June 1999. The war was fought between the forces of the Federal Republic of Yugoslavia (at this time, Serbia and Montenegro), which controlled Kosovo before the war, and the Kosovo Albanian rebel group known as the Kosovo Liberation Army (KLA), who were fighting for regional autonomy. The conflict ended in June of 1999, after NATO intervention through air strikes in March 1999 against Yugoslav infrastructure which resulted in Yugoslav forces eventually withdrawing from Kosovo.

In parallel with the brutal physical conflict was an online battle between hackers from Russia, the US, China, Brazil, Netherlands and of course parts of the former Yugoslavia, among others, forming a truly international ‘cyberwar’. The aftermath of this ‘cyberwar’ went on to shape aspects of international hacker relations and the development of hacktivism and the organisation of hacktivist groups both regionally and internationally, as well as their tactics, for years after.

an ethereal war zone where the battle for the hearts and minds is being waged through the use of electronic images, online discussion group postings, and hacking attacks

Ashley Dunn, writing in the Los Angeles Times, April 3rd 1999

Before I get into the history of this online conflict I want to make sure to clarify that the actual warfare, in particular the brutal war crimes committed by Serbian forces against the Kosovar people, is the most important part of the story of the Kosovo War. The online elements are what I am covering here specifically, because this is the history of hacking.

In researching for this blog I have drawn on contemporaneous newspaper reports from 1998 and 1999, archives of website defacements from that time, Internet Archive website archives of various news sites, government and government agency reports and finally academic papers that touch on cyber elements of the Balkan conflicts.

When I found articles in a newspaper archive about hackers and the Kosovo War I started trying to search for more information and came up with shockingly few detailed accounts of something that was front page news back in 1999. That’s why I decided to write this blog.

I have purposefully avoided discussing nation state actors (military or intel orgs) or NATO hackers in this blog, as I feel that would be an entirely separate topic deserving of it’s own blog. Rest assured though that there was coverage from the time of confirmed or suspected cyber-attacks carried out by US government agencies and the military as well as NATO itself.

US Naval Medical Information Management Center, defacement by CHC – 27th March, 1999

Let’s break down this history as a quick list of dates and notable events and then dig into the details.

28th February 1998Kosovo War begins24th March 1999NATO strikes against Serbian military28th March 1999Serbian hackers attack US military systems30th March 1999hydra defaces University of Belgrade1st April 1999Reports NATO servers are attacked29th April 1999Team Spl0it defaces US FAA website8th May 1999NATO bombs Chinese Embassy in Belgrade12th May 1999Chinese hacktivists take down White House site12th May 1999Chinese hacktivists deface US gov sites11th June 1999Kosovo War endsKosovo War & cyber elements timeline

That timeline is of course by no means exhaustive, we are going to dig into the various hacking groups involved, tactics used by those hacktivists and the hacking techniques used in the furtherance of the hacker’s goals.

Hacktivists Involved

Mirjana Drakulic and Ratimir Drakulic presented a paper entitled “Balkan Hackers War in Cyberspace” at the British and Irish Law Education Technology Association (BILETA) conference at the College of Ripon & York St. John, York, England, in March of 1999.

This paper discusses the history and nature of the primary Serbian and Kosovar hacking groups that were involved in the Kosovo War online.

WWW.HR – Croatian Homepage, defacement by Black Hand – June 20th, 1999

First we have the Black Hand, representing the Serbian nationalist side, working to advance Serbian interests in maintaining control of Kosovo. Academics Mirjana and Ratimar Drakulic describe the Black Hand as a “group of hackers [that] wanted to inherit such a reputation regarding themselves as patriots and liberators”. They clarify that the hackers who called themselves the Black Hand were “alluding to the namesake organization which overthrew the Dynasty in Serbia in the first years of the 20th century”, explicitly linking their struggle in the late 1990s to the secret military society that engaged in violent conspiracies to further the cause of a united Serbia in the early 1900s.

An illustration of the assassination of Archduke Ferdinand by the original Black Hand in June of 1914

“By the end of the October 1998 it raided the site of the Croatian news agency “Vjesnik” and left there a message: “The Black Hand wants to change the false image which orbits the planet that the Serbs are villains.” Further they stated that they do not mean war and that they mean no evil. “Vjesnik” immediately reported that the members of the “Black Hand” were discovered and where and how they approached the site.”

Mirjana Drakulic, Ph.D., Ratimir Drakulic, M.S., “Balkan Hackers War in Cyberspace“, March 30th, 1999

Mijana and Ratimar discuss various theories about the Black Hand in their paper “Balkan Hackers War in Cyberspace“, the suspected origin and makeup or the group and state that some people “are close to the view that this group exists but is followed by numerous satellites of less skilled imitators determined to get attention by the public or acquire the
“pass” to join the group”.

The Croatian news agency Vjesnik that was hacked by the Black Hand claimed, based on investigation by their journalists, that the hack and defacement of their site was done “from the computers of two faculties they pointed to Serbian academic network claiming that hackers still travel and act from within it”, although those computers themselves could have been simply a jump box used by the Black Hand.

As well as the Black Hand we also have other players on the Serbian side, the Beograd Hackers group that carried out some defacements and the Serbian Angels. Serbian Angels, based on what little I have managed to find out about them, functioned as an offensive hacking group but also maintained a website (long since lost) that carried news about events relating to the war in Serbia, maintained various news e-mail lists and created for distribution physical CD archives of news, photos and videos from the Serbian side of the conflict after the NATO campaign ended.

“Stop Nato2”, defacement by Kosova Hackers Group – August 4th, 1999

On the Kosovo side there was, as reported by Patrick Riley in his FOX article from April 15th 1999 “E-Strikes and Cyber-Sabotage: Civilian Hackers Go Online to Fight“, “a coalition of European and Albanian hackers calling themselves the Kosovo Hackers Group has replaced at least five sites with black and red “Free Kosovo” banners”.

As well as hackers that purported to be from the former Yugoslavia there were other groups involved in this “cyberwar” that were motivated by ideological or nationalist impulses to throw their lot in with either the Serbian or Kosovar people, or to push for peace treaties or oppose NATO actions generally. It is important to note that most, if not all, of these hacking groups from outside the former Yugoslavia became especially active in the online conflict after the start of the NATO military campaign in March of 1999.

US Federal Aviation Authority, defacement by Team Spl0it – April 29th, 1999

In the United States there was Team Spl0it (or Team Sploit) who opposed the bombing of Serbian infrastructure by NATO and expressed the opinion that “without the support of the people in Serbia NATO is not gonna get very far”. As CNN described it at the time, “American hackers are on a political binge, breaking into Web sites to leave what amounts to anti-war graffiti”.

Watching the news today, I found out that Serbia has been bombed for the 4th week in row. And I wondered what has been accomplished after these 4 weeks of air strikes. Who has gained from it, and who has lost ? Many targets inside Serbia have been hit, many civilians were killed. But Milosevich, the Serbian President doesn’t give a damn about his people. He couldn’t care less if they are dead or alive. What is the good of actions when the president doesn’t care about the targets that have been hit ?

f0bic, nostalgic, cellbl0ck, jay, text from defacement of US FAA website, April 29th, 1999

Also on the US side, although primarily memorialised only in throwaway comments in newspaper articles from the time, were “Hackers of the West Coast”. As described by Patti Hartigan, writing in the Boston Globe on April 4th, 1999, “Hackers on the West Coast are trying to crack the Serbian government site, although the server is said to be extremely secure and based in London”. I can find no evidence that Hackers on the West Coast succeeded in their goal. You can see the whole article below.

The pro-Serbia Russian Hackers Union was a loose affiliation of Russian hacking groups that, for the most part, already seem to have been present and active in the defacement scene before NATO started bombing Serbian infrastructure, prompting a change in the themes of website defacements carried out.

KpZ in particular wracked up some notable defacements but seemed to be very difficult to track down further information on until I dug into Russian hacker magazine XAKEP. Websites defaced by KpZ ran the gamut from a juicy .mil hosted U.S. Army Engineer Waterways Experiment Station all the way through to the somewhat more random, and rather lacklustre, “airbed.com”. A hacker known as Mishgan seems to be one of their primary defacers around this time, KpZ appears to have been made up of primarily Russian hackers but also at least one member who identifies themselves as Romanian.

Russian XAKEP (“Hacker”) magazine issue four had an article about KpZ that offers some insight into the group. I’ve written about XAKEP before, I covered issue one in some detail.

The group in question was formed at the end of August 1998. Just when thousands of teenagers, having watched the movie “Hackers” and read articles about hackers, rushed to the Internet, thinking they were professional hackers. And the initial idea of the group was to show children that they are wrong, and the World Wide Web is not a place for such entertainment and for people with delusions of grandeur.

XAKEP Issue 4, “KPZ hacker group – from the inside“, 1999 (translation by DeepL)

XAKEP lists the members of KpZ as Tarantino, Delta, MAL, v00d00, 5pider and Mishgan. The hacker nick “v00d00” has been used by at least 3 different hackers over the years, sometimes very active at the same time, which can cause confusion.

“Emergency Issue” CD-ROM produced by KpZ, 1999

Above you can see a photo of a CD-ROM that KpZ provided to XAKEP that the XAKEP writers describe “when this CD was brought to our office today, we were shocked. What’s it like, huh?” They go on to give details of this CD entitled “Hackers are bombing NATO” and how it “has tons of information on what to do and how to do it, including explanations of security holes in security systems and a bunch of other documentation”. The CD-ROM essentially contained instructional content for budding Russian hacktivists, “a special training course for a separate unit of a special brigade for information provocation”.

XAKEP interview MAL and Mishgan as part of issue four, MAL describes the group as having started after he received an ICQ message that said that there was a desire to organize “a group to combat underdeveloped admins and shameful sites.” In the same interview Mishgan claims that he is 15 years old, this fits with interviews I have read with other Russian hacker groups from this time.

Illustration from XAKEP Issue 4, “KPZ hacker group – from the inside“, 1999

KpZ also seem to have forged some sort of alliance with Romanian hacking and defacement crew Pentaguard, although I can find no evidence of defacements by Pentaguard in opposition to NATO during the Kosovo War.

US Joint Tactical Unmanned Aerial Vehicle Project, defacement by Pentaguard – January 25th, 1999

Also tagged in some of the KpZ defacements are legion2000, a Russian group that seems to have been more concerned with security advisories, releasing code and working on projects than defacements in 1999, from what I can turn up. There is an interview with Webster, one of the legion2000 members, from 2001 over at xakep that seems to imply some falling out between legion2000 and KpZ.

http://www.legion2000.cc/ – via Internet Archive

The few defacements I can find by legion2000 occur in 1998 and are of Russian websites.

kopitan.ru, defacement by legion2000 – December 6th, 1998 pentagon.yu, defacement by xoloth1 of DutchThreat – May 2nd, 1999

DutchThreat, a Holland based hacker group, came in on the side of NATO and in support of the Kosovar people.

NATO does not prosecute innocent people

NATO does not raid

NATO does not create the mass-graves in your country

NATO is not out for blood, but out for peace

xoloth1, meestervervalser, defacement of pentagon.yu – May 2nd, 1999

CNN described how DutchThreat became involved in the hacker conflict that accompanied the Kosovo War, “Xoloth1 said he got mad when a “Serbian guy” in a chat room started calling NATO and the U.S. a bunch of criminals and Nazis” He also resented that one of the main Yugoslavian ISPs had set up an anti-NATO Web page with the domain name pentagon.co.yu”. CNN’s Ellen Messmer went on to explain “Dutchthreat’s leader, named Acos, says he thinks most of the Kosovo-inspired hacking going on is not motivated by genuine political concerns, but is simply a way of getting attention. But Acos adds he, too, doesn’t care to hear NATO called fascist.”

I was able to find an old archive of the DutchThreat website, but there was very little about the Kosovo War mentioned on it, other than a reference to an article that included information about the group that they approvingly posted.

Newsmax.com, defaced by Chaos Hackers Crew (CHC) – 28th February, 1999

Russian hackers Chaos Hackers Crew were a fairly standard defacement for internet clout group prior to the start of the NATO bombings against the Serbian military, as seen above.

After the NATO military campaign began in March of 1999, CHC switched to strident anti-NATO messaging on compromised websites.

An example of a defacement post March is below.

USDA Natural Resources Conservation Service, defaced by Chaos Hackers Crew – 6th April, 1999

I have seen speculation online that CHC were a Kremlin backed group based in Moscow. I’m not sure I see any evidence of this direct government association though, their choices of targets before the Kosovo War and the profile that they seemed to want to maintain online doesn’t really fit in my opinion.

A group of teenage hackers called Chaos Hackers Crew (CHC) is active in anti-NATO attacks: an interview with a representative of this group has been published in an electronic paper Gazeta.ru (Leibov 1999). The young man turned out to have been apolitical before the crisis in Kosovo. He had very limited knowledge about the reasons NATO was bombing Yugoslavian targets, and the sites the CHC chose for its attacks had nothing to do with the military ones (for example, a Chinese site was mistakenly attacked).

Brian D. Loader, Douglas Thomas, “Cybercrime : law enforcement, security and surveillance in the information age“, 2000

After some search engine chicanery I managed to track down the Gazeta interview with the self-professed members of CHC, the reference to Kulibin below is to the “Russian Archimedes” Ivan Kulibin, a self-taught inventor who lived in Russia in the 1800s.

“Chaos Hackers Crew,” the hackers say, “there are four of us in total. And there are different ages. There’s a third year of university, too.” “The older one is kind of a guru? Did you even have a teacher in the networking life?” “Nope,” Yuri answers, “we’re kind of all equals. Only taught everything myself.” “Kulibin! – I admire, by manuals?” “What?” – The interlocutor is perplexed. “Kulibin,” I explain, “self-taught like that. “Yeah, like that.” “By the way, do you know any foreign hackers by correspondence?” – I change the subject again.

Indeed, hackers are like Freemasons or workers, they must have international solidarity.

“Nope,” they replied, “only from Romania. Well, Romania is also a foreign country. Though, of course, not very far.

Roman Leibov, “Our Hacker Brothers II. The beginning is here”, gazeta.ru, April 15th, 1999 (translated by DeepL)

I think it is safe to say we can put the Kremlin backed hackers theory to rest here, although if you google CHC you will see that it is an opinion that was widely held despite a lack of evidence.

US Department of the Interior, defaced by unknown Chinese hacktivists – 10th of May 1999

After the bombing of the Chinese Embassy in Belgrade on the 8th of May in 1999, China Redhack, Hong Kong Danger Duo, China Eagle, Chinese Emergency Hackers’ Group Center and other hacking groups representing Chinese nationalist interests took to the internet to protest what they saw as a deliberate act of violence against the Chinese state by NATO and in particular the US.

Combined News Services, “Hackers Hit U.S. Government Web Sites“, 12th May 1999

“We are Chinese hackers who take no care about politics,” said the message signed by “Rocky.” But with three Chinese nationals left dead after the embassy bombing, the hackers were wrathful: “You have owed Chinese people a bloody debt which you must pay for! We will not stop attacking until the war stops!”

Ellen Messner, “Kosovo cyber-war intensifies: Chinese hackers targeting U.S. sites, government says“, CNN, May 12th, 1999

By this time US hacking group Legion of the Underground had already declared a brief “cyber war” on China and Iraq, calling for “the complete destruction of all computer systems” in both countries, so the genie was well out of the bottle to some extent in terms of hacker conflict between the US and China.

Solid Design Inc, defacement by RedHack – April 30th 2001

Two years after the Embassy bombing Chinese hackers were still defacing US websites in protest, as the BBC reported on the 5th of May 2001, “hackers promised a cyber-offensive against US sites in observance of Chinese of Labour Day on 1 May and Youth Day on 4 May, and also in remembrance of the US bombing of the Chinese embassy in Belgrade two years ago on 7 May”.

This round of attacks in 2001 resulted in the defacement of, according to the BBC at the time, “more than 660 sites” in the space of a week and the “White House confirmed that for two hours and 15 minutes their website was down”. It is important to note that this particular hacktivist action from Chinese hackers was also motivated by the US spy plane incident in April of 2001 and Bush administration arms sales to Taiwan.

Tactics & Techniques

“NATO spokesman Jamie Shea said hackers in the Yugoslavian capital, Belgrade, attacked the Web site by launching what is known as a “Ping bombardment strategy.” Ping, short for Packet Internet Groper, refers to the practice of sending out a packet of information to a server and waiting for a response, which is a way for users to determine whether a system is up and running on the Internet.”

Dan Verton, “Serbs launch cyberattack on NATO“, FCW, April 4th, 1999

After reading over all of the available documents and analysis of the Kosovo War’s online components I was able to find four primary techniques used by hackers involved.

The first is denial of service, or DoS, this seems to have been primarily used by Eastern European hackers opposed to NATO intervention in Serbia and hackers supportive of China after the Belgrade Embassy bombing.

The BBC explains denial of service (DoS) basics (described here as a “ping storm”) in an article entitled “Kosovo info warfare spreads“, by Chris Nuttall from April 1st 1999.

The article details DoS attacks against NATO that had been ongoing since the 28th of March and had slowed parts of their web infrastructure and caused “erratic service”.

CNN reported in April of 1999 that to counter incoming DoS attacks “the NATO network crew swapped out a Sun SPARC 20 for the more powerful UltraSPARC for faster processing of the Serbian pings.” And that “NATO switched from a 256K bit/sec access line to the European equivalent of a T-1 to keep the pings from eating up bandwidth”.

Next up we have website defacements, screenshots of defacements are peppered throughout this blog so I won’t dwell too long on this aspect beyond noting that it is interesting that these hacks were not accompanied by leaks of data from the servers involved.

Faculty of Physical Chemistry University of Belgrade, defacement by hydra – March 30th 1999

I can only ascribe this to either data exfiltration and leaking simply not being a common hacktivist activity at the time, the issue of slow internet connections for transferring data back in 1999 and a lack of file sharing servers to upload to or that the servers hacked did not include data that was worth leaking. I’m personally inclined towards the first and second explanations.

Richard Clark is not in the military, but when he heard news reports
earlier this month that NATO’s Web site had been attacked by Belgrade hackers, he wanted to do his part to help the allies. So he turned to his keyboard.

Using software available on the Internet, the California resident sent
an “e-mail bomb” to http://www.gov.yu, the Yugoslav government’s main Web
site. On April 3, a few days and 500,000 e-mails into the siege, the
site went down, Clark said.

Clark does not claim full responsibility for the cyber-sabotage; he
assumes others may have had similar ideas. But he is confident he
“played a part.”

He is just one of untold numbers of civilians on both sides of the
conflict who have gone to battle from their desktops, raising new
questions about the role of civilians during times of war.

Patrick Riley, “E-Strikes and Cyber-Sabotage: Civilian Hackers Go Online to Fight”, FOX News, April 15th, 1999

The third technique we can see in use is e-mail bombing or spamming, sending thousands upon thousands of emails which are intended to annoy or overwhelm recipients and, in 1999 at least, potentially prevent the mail server itself from functioning.

From the Washington Post on April 1st, 1999, article entitled “Hackers irritate NATO”. The article describes how e-mail bombing campaigns by Serbia aligned hackers have impacted NATO’s online infrastructure. One such attack “effectively blocked mail service in and out of the NATO computer system”.

“That means that rogue computer users are sending a lot of messages and computer commands into NATO’s computers, said Carlo Tomad, a NATO network specialist in Brussels. One computer, he said “has sent about 2,500 messages in one hour,” a method of harassment known as “spamming.” That attack effectively blocked mail service in and out of the NATO computer system, Tomad said.”

“It’s the infowar equivalent of ringing someone’s doorbell and running away, but many thousands of times”, concludes the article.

Happy99 Virus in action

Hackers enraged by the Chinese Embassy bombing latched on to this technique soon after online protests over the incident began. In May of 1999 CNN reported that “Sandy Spark, a manager at DOE’s Computer Incident Advisory Capability (CIAC), warned that a Chinese tidal wave of e-mail with unresolvable IP addresses is being sent to U.S. government servers in an attempt to overload them”. The solution pitched was the rather inelegant, and potentially useless, advice to “apply anti-spam measures to block all e-mail from China’s .cn domain if necessary”.

Ellen Messmer writes for CNN (Serb supporters sock it to NATO, U.S. Web sites) that “NATO’s mail servers are taking a beating, getting hit with more than 10,000 e-mails per day – many infected with dangerous computer viruses”. So lastly we have what the head of NATO’s Integrated Data Service Chris Scheurweghs described as “macro viruses”.

According to Scheurweghs, hackers also attacked NATO’s e-mail systems with the Happy 1999 macro virus, which he said was similar in function but far less devastating than the Melissa virus that wreaked havoc in the United States last week (see story).

Dan Verton, “Serbs launch cyberattack on NATO“, FCW, April 4th, 1999

Happy99 is a very odd choice for a virus to attach to an e-mail for malicious purposes as, according the the Virus Encyclopedia, “although Happy99 is wild, it has no destructive payload and is, as its author describes, a ”sympathetic hitchhiker who uses your internet connection to travel, and thank you for the trip with a small animation””.

Final thoughts

What is the take away from all of this, and was it really the first international hacktivist cyberwar?

The first question is easier to answer. Hacktivism has traditionally been reactive, you have a pool of active hackers organised into groups or loose affiliations who are ready to act on what they perceive to be provocations.

Most of the hacking groups or alliances involved in the Kosovo conflict were already active in the defacement scene or at the very least had infrastructure or output of some kind, they were already visibly doing things online. NATO’s bombing campaign against the Yugoslav government provided the catalyst for involvement, either for or against the intervention.

The interesting exception to this are the hackers aligned with China, I couldn’t find defacements archived from groups like ChinaEagle or RedHackers from before the Embassy incident, although I fully admit here that my knowledge of, and visibility into, the Chinese hacking scene of 1999 is a little dismal.

A previous Chinese hacking group, the Green Army, had been involved in a previous international hacktivist action though, attacks on Indonesian websites in 1998 after “reports of looting, violence and rape committed against ethnic Chinese during riots in May [of 1998]”, as detailed by the BBC at the time. Much of the analysis I have read has pointed to these riots in Indonesia as a galvanising event that helped unite the Chinese hacking community.

Indonesian websites have also come under attack from political hackers. The home page of a site at http://www.bkkbn.go.id has been replaced with a message saying “Warning from Chinese.”

“This page is hacked for your national day. Please keep this page for 48 hours and punish the murderers in May immediately,” says the hacker, including a list of links to sites about the violence.

Chris Nuttall, “Chinese protesters attack Indonesia through Net“, BBC News, August 19th, 1998

The groups representing China that became involved in the Kosovo War can be seen as offshoots of this original organized backlash against Indonesia.

The Indonesian riots also give birth to what would become the “Red Hacker Alliance”, one of the most significant cyber-groups in the internet’s short history. The political nature of this patriotic campaign led to the creation of something entirely new, and would be the first time the term “red hacker” (红客 hongke) would be used. The attacks in the country functioned as the facilitator that brought together individuals who normally operated independently under the guise of nationalism, establishing not only a group but also the notion of red
hackers which still exists today.

William Howlett IV, “The Rise of China’s Hacking Culture: Defining Chinese Hackers“, June 2016

When an American spy plane had a collision with a Chinese jet in April of 2001, killing a Chinese pilot, the online warfare between American and Chinese hackers reignited over this “Hainan Island incident” and the resulting website defacements showed that the Kosovo War was still very much on the mind of hackers in China.

“China is no longer a country like Yugoslavia, we have the best army”, defacement by DCBOY in 2001, from FBI FOIA documents relating to Honker Union

In looking through old gazeta.ru articles relating to hacking from around this time I found a link to an article that is preserved on the Wayback Machine entitled “Hackers of U.S. servers face criminal liability” (as translated by DeepL), the article is written by Dmitry Chepchugov, head of the Department for Combating Computer Crimes of the Russian Ministry of Internal Affairs. The article is essentially an exhortation to Russian hackers to not attack NATO or the U.S. accompanied by some strident threats of criminal liability.

To date, we have not received any statements from official U.S. bodies regarding “attacks” on servers from Russian territory or damage related to protests against NATO actions in Yugoslavia. If such information is received, it will undoubtedly be verified in full, with the perpetrators identified and brought to justice as prescribed by law.

I would like to take this opportunity to address the people who know the intricacies of network technology. No matter how much your civic consciousness is outraged by NATO’s actions in Yugoslavia, no matter how much you want to express your own feelings about these events – don’t go down this road, don’t become the aggressor yourself. You are breaking the law, you are making yourself the perpetrator of an arbitrary massacre. Is this not what your mind rebels against?

Dmitry Chepchugov, “Hackers of U.S. servers face criminal liability”, March 28th, 1999 (translated by DeepL)

I have been unable to work out how real these threats by the Russian authorities are and whether any Russian hackers were ever charged or convicted of hacking offences, but it certainly forms an interesting bookend for current attitudes within the country towards hackers who attack targets externally.

“Electronic infiltration is burgeoning war zone of hackers worldwide”, Patti Hartigan, April 1999

I see certain parallels between the hacker elements of the Kosovo War and armed conflicts that have taken place since that included a ‘cyberwar’ facet. The Syrian Electronic Army, KILLNet, the CyberBerkut, we can see echoes of the Black Hand here, hacktivists either fully backed by, or at the very least actively encouraged, by the authoritarian regimes that they support.

Was the Kosovo War the first international hacktivist cyberwar?

The New York Times claims it was the conflict inspired by the American spy-plane incident and China in 2001.

It was a Big Hack Attack, a harbinger of World Wide Web War I, with ”zombies” throwing ”worms,” Chinese patriots invoking the ultimate sacrifice and American teenagers giving electronic Bronx cheers.

After last month’s collision of an American spy plane and a Chinese jet, hackers in the United States and China began defacing Web sites on both sides of the Pacific. Then Chinese hackers, led by a group called the Honkers Union, declared war.

Criag S. Smith, “May 6-12; The First World Hacker War”, New York Times, May 13th, 2001

I for one am sceptical, I’m of the opinion that the Kosovo War is a better candidate for that title, but I’m also under no illusions that there aren’t preceding conflicts that are also potential contenders for this dubious award.

There were organised hacking attacks carried out by hackers from one country against online infrastructure from another country before the Kosovo War but in those earlier examples, Chinese hackers attacking Indonesian websites for instance, I couldn’t find any evidence of retaliation. The Kosovo War wound up involving a back and forth of hack attacks between hackers from different nations in a way that I don’t think the world had seen before.

If you enjoyed this blog consider subscribing or posting it on the social media of your choice, I do all of this simply to get the word out about a subject I love.

https://realhackhistory.org/2023/07/16/first-international-hacktivist-cyberwar-online-conflict-the-kosovo-war/

#Brazil #CHC #China #ChinaEagle #cyberwar #DutchThreat #hacker #hackers #hacking #hacktivism #hacktivist #Hackweiser #history #HonkerUnion #KosovaHackerGroup #Kosovo #KpZ #NATO #newspaper #Pentaguard #Romania #Russia #RussianHackerUnion #RussianHackers #Serbia #Serbian #Slovenia #TeamSpl0it #TeamSploit #USA #war #XAKEP #Yugoslavia