Six years ago, a powerful Team of Greek Hackers (PGAs) emerged in the threat realm, and after a long period of destruction, they returned again, what was the motivation behind the attack? Here are exclusive interviews with them, so read them carefully!
01
What is the motivation behind the attack?
We have many motives and reasons. First, we start with random targets for different countries, not just Greece, Greece is just in our minds. Our old Twitter account has been suspended, and it has carried out multiple attacks on government agencies, companies, educational institutions, and many other things around the world (we still do, albeit on a smaller scale).
02
When were you founded? What is the scale?
PGA was founded in 2016 when the hacking field, especially on Twitter, was basically non-existent, when only a handful of teams existed, completely random. We started talking to some of these teams and built good relationships that we have maintained to this day. Our [founders] wanted to find a team and compete with other teams. We haven't been active for many years, like we stopped in 2017 and we came back in 2-3 years later because we were all around and did things that only a few people could imagine, with different, many aliases and nicknames. Sure, I won't go into deep water, but that's one of the reasons we've been so inactive. At the moment we have a size of about 20 people.
03
How to choose a victim?
Recently, we have chosen our victims based on actions carried out around the world, and as I said before we have no specific goals. If we have time to try, we can compromise pretty much anything that is vulnerable/capable of being hacked, and I think even a very mediocre hacker should be, because if you find a vulnerability somewhere, you can easily take action and exploit them. It is worth noting that nothing on the Internet is safe. After all, we are young people, and some people have accumulated more knowledge, but they have less experience, and these things are not handled because they see them illegally.
04
What have you all attacked?
We attacked a lot of things. Most of the attacks were not covered. For example, our final objectives, most of which are accomplished within a month, are the Ministry of Foreign Affairs of North Macedonia, the National Bank of North Macedonia, the Ministry of Foreign Affairs and Finance of Nigeria, the Bank of Nigeria and the Ministry of Defence of Azerbaijan, among others. We also invaded the Ministry of Education and Science of North Macedonia and even accessed their camera system.
05
What was your biggest failure?
I think our biggest failure was when some of our members stayed alone and were arrested, and most of them went to jail for years, but not because of hacking.
06
Are all of your members in Greece? Where are they all distributed?
Only a few of our members are Greeks. We are a very mixed group. That's why the Greek hackers either hid them all or didn't exist at all. Over the years, we have found very few Greeks, and they are being searched almost everywhere. We really hope greeks can help. It's a real wish and I want those who can see it to contact us. I can tell you with certainty that if we had Greeks, they would make up 90%, if not all, of the team. Right now, our nation's hacking community is basically dead, and that's been around for years. This is one of the main reasons why we have never been associated with Greece. I would like to point out that of course we love our country, but at the same time we are also some kind of internationalists.
07
Which are the most dangerous hacking groups in the threat space?
I think the most dangerous hacking teams in the threat space are those who don't have a big voice. Ransomware gangs can be very dangerous because these people, even if they don't require any skills to write ransomware, are really for money and not for their hobbies or even their reputation, and they take huge risks. I feel like the number of hackers around the world is decreasing every day, and at this time they need it more than ever. I think all hackers should be united.
Note: This article is reported by E Security Compilation.