Royal Bank of Scotland in Anonymous crosshairs
Anonymous targets a host of companies as part of its Operation Green Rights campaign.


Anonymous has announced its intention to target the Royal Bank of Scotland as part of an operation campaigning against "big oil."
The hacktivist group said Exxon Mobil, ConocoPhillips, Canadian Oil Sands and Imperial Oil were also in its sights.
Those companies have been involved in developing the Alberta, Canada oil sands, an operation which has caused controversy amongst environmentalists.
Anonymous did not go into any detail on what it would do as part of Operation Green Rights.
"Anonymous now joins the struggle against "Big Oil" in the heartland of the US. We stand in solidarity with any citizen willing to protest corporate abuse," the group said.
"Operation Green Rights will always support the rights of the people to live in an unpolluted world, and aim to help safeguard it for the future. One way or another."
Anonymous has also claimed a hit on international agricultural business Monsanto.
Get the ITPro daily newsletter
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
The hacktivist group said it had released addresses, emails and phone numbers of more than 2,500 Monsanto workers and affiliates.
"Anonymous didn't release details on types of systems, flaws or anything else that might explain how they acquired the stolen information. They claim to have taken down Monsanto web assets and mail servers," said Sophos senior security advisor Chester Wisniewski, in a blog post.
"Anonymous mentioned port 6666 being open on a Monsanto server, implying that they might set up an IRC channel on the compromised host. Anonymous also stated they intend to create a wiki for sharing and organising their stolen information."
Tom Brewster is currently an associate editor at Forbes and an award-winning journalist who covers cyber security, surveillance, and privacy. Starting his career at ITPro as a staff writer and working up to a senior staff writer role, Tom has been covering the tech industry for more than ten years and is considered one of the leading journalists in his specialism.
He is a proud alum of the University of Sheffield where he secured an undergraduate degree in English Literature before undertaking a certification from General Assembly in web development.
-
Should AI PCs be part of your next hardware refresh?
AI PCs are fast becoming a business staple and a surefire way to future-proof your business
By Bobby Hellard Published
-
Westcon-Comstor and Vectra AI launch brace of new channel initiatives
News Westcon-Comstor and Vectra AI have announced the launch of two new channel growth initiatives focused on the managed security service provider (MSSP) space and AWS Marketplace.
By Daniel Todd Published
-
96% of SMBs are missing critical cybersecurity skills – here's why
News The skills shortage hits SMBs worse as they often suffer from a lack of budget and resources
By George Fitzmaurice Published
-
Sophos Firewall Virtual review: Affordable network protection for those that like it virtualized
Reviews Extreme network security that's cheaper than a hardware appliance and just as easy to deploy
By Dave Mitchell Published
-
MSPs are struggling with cyber security skills shortages
News A shortage of tools and difficulties keeping pace with solutions were also ranked as key issues for MSPs
By George Fitzmaurice Published
-
Nearly 70 software vendors sign up to CISA’s cyber resilience program
News Major software manufacturers pledge to a voluntary framework aimed at boosting cyber resilience of customers across the US
By Solomon Klappholz Published
-
Sophos and Tenable team up to launch new managed risk service
News The new fully managed service aims to help organizations manage and protect external attack surfaces
By Daniel Todd Published
-
Ransomware groups are using media coverage to coerce victims into paying
News Threat actors are starting to see the benefits of a more sophisticated media strategy for extracting ransoms
By Solomon Klappholz Published
-
Shrinking cyber attack “dwell times” highlight growing war of attrition with threat actors
News While teams are becoming more proficient at detecting threats, attackers are augmenting their strategies
By Ross Kelly Published
-
Cyber security in the retail sector
Whitepapers Retailers need to ensure their business operations and internal data aren't breached
By ITPro Published