Press

Cyber Subversives

By Help AG

By 
A range of factors can be attributed to the rise of hacktivism. Throughout history, economic and political dissatisfaction have always been cause for public dissent, but the increased prominence and dominance of the Internet has made online subversion one of the first ports of call for 21st century dissidents.
Hacktivist groups like Anonymous have made it their mission to exploit social media, taking aim at governments and organisations they perceive to be corrupt and dictatorial. Julian Assange’s WikiLeaks has also gained infamy by publishing a range of information about high-level wrongdoing on a range of culprits. In the Middle East, the Syrian Electronic Army is an organisation that is never far from IT-related headlines. The group frequently defaces the social media accounts of numerous high-profile American organisations, and has targeted Forbes, Microsoft and CNBC amongst others. Although the attacks may not be incredibly sophisticated or damaging, they grab widespread attention.
“Before the Internet, there was the power of street protests and demonstrations,” Jason Hart, Vice President, Cloud Solutions, SafeNet, says. “The rise of the Internet changed the rules of the game. The principle remains the same at its core, in terms of motivation, purpose and result. The evolution of technology marked the change in technique for those who want to change the world and the results are at least as dramatic.”
Nicolai Solling, Director of Technology Services, Help AG, also believes the ubiquity of IT services makes hacktivism the obvious choice for mayhem, “A prominent factor in the increasing scale of hacktivism is the growing significance of IT systems in everyday life,” he says. “Today, any large public or private sector organisation has an online presence and will certainly depend very heavily on a number of IT systems. Given that disruption to these services can cause an immediate and noticeable impact on the business, it is no wonder why hacktivism is such an effective tool.”
The typical hacktivist is not financially motivated. In that vein, their main goal is to influence opinion, and to negate the reputation of their target. The main way they can do this is to disrupt web services or by defacing sites. This service interruption and resultant bad press can always have a negative impact on a business, and against unscrupulous rulers, serves as a form of non-violent yet effective protest. Unlike hackers who are often financially motivated and whose ends are self-serving, hacktivists will always have a degree of support, as their actions are mostly politically or socially motivated. Their other principle means of attack is by extorting information, which can be used to blackmail their victims.
“One school of thought considers hacktivists to be cybercriminals that must be prosecuted, the other, despite being conscious of the threat they represent, maintains that they are a voice to listen to,” says Firosh Ummer, Managing Director, EMEA, Paladion Networks. “Their intent is never to hit civil people or critical infrastructures, so one of their most common attacks has been distributed denial of service, which has become sophisticated over time by using any visitor on a site as an attacker to send an enormous quantity of requests in a short period to disable a website or web service.”
Although hacktivists are not always associated with governments or powerful organisations, their beliefs often align with them. But is there a point at which the lines blur between noble hacktivism and illegal sabotage, or are the two one and the same? Can hacktivists be regarded as a modern-day Robin Hood, attacking the powerful to help the afflicted, or are their actions conducive to a culture of cybercrime?
Mohammed Amin Hasbini, Senior Security Researcher, Kaspersky Lab, believes there is a clear pocket of what is acceptable, “There’s only one type of hacking that can be defended: ethical hacking,” he says. “After an agreement with an organisation, an ethical hacker is hired to test the organisation services for weaknesses that could be abused by cyber criminals; the ethical hacker might be requested to exploit the vulnerabilities only if officially approved by the organisation, to find the range of a certain weakness.”
Mohamed Djenane, Security Specialist, ESET Middle East, thinks it is becoming increasingly difficult to distinguish between the two, “We are seeing hacktivism now blend with more serious cyber-terrorism as was the case with the Sony hack in 2014,” he says. “Here, beyond reputation loss, sensitive information was leaked which was then used for blackmail. When an organisation falls victim to a traditional hacker, the news of the data breach is not generally publicised as the hackers are driven by financial motives and would prefer not to draw attention to themselves.”
Although most civilian organisations do not run a great risk of being a victim of hacktivism, vigilance still pays, says Greg Day, Vice President and Chief Technology Officer, EMEA, FireEye. “As with all cyber-threats, each organisation needs to consider the probability and potential impact to themselves; their business risk analysis,” he says. “This should include analysis as to what their brand externally represents, who could see them as a target and why, then analysis of their own technology – the business dependancies on this and how well they would be able to detect and respond to such an incident.”

More Sources

Aleksandar ITP Article
Press
Dr Aleksandar Valjarevic Recognized Among Middle East’s Security Leaders to Watch 2026

Dr. Aleksandar Valjarevic, Acting Chief Executive Officer at Help AG, has been featured in Edge Middle East’s Security Leaders to Watch 2026 list in the April issue. This recognition highlights his leadership in advancing cybersecurity strategy, driving innovation, and strengthening digital resilience across the region. Under his guidance, Help AG continues to play a key role in enabling organizations to navigate evolving cyber threats and build secure digital ecosystems.

Help AG x Securonix Article Cover
News
TechAfrica News - Help AG Expands AI-Powered Cloud SOC Capabilities Through Renewed Partnership with Securonix

Help AG has expanded its partnership with Securonix to enhance its AI-driven Cloud SOC services in the UAE. The collaboration strengthens threat detection and automation, reinforcing Help AG’s market leadership recognized by IDC and Gartner.

The Quantum Leap
Press
The Quantum Leap - On the Ground at Black Hat MEA 2025 with Help AG & Sandbox AQ

Help AG and SandboxAQ are collaborating to prepare Saudi Arabia for the post-quantum era by strengthening cryptographic resilience. The partnership supports secure digital transformation and long-term cybersecurity readiness.

Nikola Kukoljacs Gulf News
Press
Gulf News - The Dubai trailblazer mindset for 2026: How to win beyond the rat race without burnout

Nikola Kukoljac, Vice President of Solution Architecture at Help AG, shares in an interview with Gulf News how reflection, micro-steps, and “controlled chaos” help him balance leadership and life. He emphasizes emotional clarity, realistic planning, and steady progress—proving that success doesn’t have to be a race, but a journey built on small, sustainable steps.

Cybersecurity Image
News
The Catalyst - Help AG leads the way in AI driven security solutions

In an interview with The Catalyst, Safwan Akram, Country Manager KSA highlighted Help AG’s role in strengthening Saudi Arabia’s cybersecurity landscape and supporting digital transformation. He emphasized innovation and proactive strategies to address evolving and AI-driven cyber threats.

Dr Aleksandar Valjarevic - Fast Company Middle East
Press
Fast Company Middle East - Dr Aleksandar Valjarevic Joins 25 Leaders on Creating Lasting Impact

Fast Company Middle East featured Dr Aleksandar Valjarevic, Acting CEO of Help AG, among 25 leaders shaping lasting impact across the region in 2025. He emphasized embedding cybersecurity into innovation, highlighting resilience, foresight, and trust as essential pillars for sustainable growth and long-term progress.

Download the Content

I’m interested in the solutions & services from?

(Choose all that apply)

Schedule a Consultation