Anonymous Hacker Known As XeljomundoX Arrested by Spanish Authorities – Faces 11 Years

Unfortunately, upon logging back online this evening I was met with a bit of bad news. This would be the news that the Anon known as “XeljomundoX,” one of the primary leaders of #OpCatalonia2019, was arrested for their alleged role in advertising and encouraging not just the Catalonian protests which took place this week, but also for their role in encouraging cyber attacks against the Spanish Government with a video shared to social media this past Monday.

As was first reported to me by Anonymous News this afternoon, roughly 5 hours ago, “The former hacktivist arrested again #Anonymous @YourAnonXelj. He was also arrested for cyber attacks on 1-O and they ask him for 11 years in jail. Now accused of spreading a video of which he is not part of the attacks.” On top of that, as was reported by the Spanish news paper El Confidencial today “One of the ‘hackers’ linked to the one known as #OpCatalonia2019, a series of cyberattacks launched this week in protest of the ‘procés’ ruling, has been arrested this morning by the National Police at his home in Tarragona. He is accused of alleged crime of computer damage for being behind a video announcing the cyberattack campaign that occurred as of Monday.

In case you had not seen it or were curious, here is the video he was arrested for………

This is also the second time XeljomudoX has been arrested. They were previously arrested by Spanish authorities earlier this calendar year, in January 2019, following their participation in various international hacking campaigns. Most notably, the hacks and leaks associated with the original #OpCatalonia which took place throughout 2017 and the months/years to follow.

For example, other members of Anonymous put out a video this evening in support of XeljomudoX, stolen video footage detailing the search of Xel’s home and seizure of his computer and social accounts from this past March – lulz……..

Additionally, in protest/support of XeljomundoX myself, I sent a private message to his previously seized Twitter account with my DoB, SSN, home phone number and address, telling Spanish National PoliceArrest me you cowards. I will post the video every single day until he is free. Want to arrest someone for a video, now I know the Spanish Government is desperate. Then you wonder why all these people despise and protest you. DO you actually have pride for Spain? Has any country in the world fallen off any more significantly than Spain the last 600 years? You used to own part of the USA, Central America and South America. Now what are you? A shell of your former shelf, lost all your territory, lost your glory. Now your just a single nation with a failing economy, at the bottom end of the EU. What would you even do without the international bailouts? It’s pathetic. Now you try to stop on anyone who speaks negatively of your country? That’s fucking sad. Ask your boy Mussolini how well Fascist approaches worked for him. You will fall, and it’s because of your own actions. Spend half the effort looking into a mirror that you do trying to squash free speech. This is why you are cowards, and why I would love to speak my piece in your shithole country.

Not unexpectedly, at the time of this article I have not received a response from Spanish authorities, and have no further update on Xel’s situation. Stay tuned.

If you’d like to learn more about this weeks cyber campaign, you can read more here:

The Highlights: Fallout & Damage from #OpCatalonia2019

For those of you whom might not have been aware, massive protests and demonstrations took place all throughout Spain today, October 14th 2019, in protest for the failed annexation of Catalonia in December 2017, in support of all the political prisoners whom continue to be incarcerated from it at the hands of the Spanish Government ever since and those whom will continue to be imprisoned for it in the future, as well as to renew Nationalistic spirits/ambitions to make Catalonia an independent state once again in the future. While most of the protests were political based and non-violent, this does not mean there wasn’t any violence – from both police and/or protestors alike.

Additionally, as I was writing this article, it was just announced that members of the Catalonia independence leaders were just sentenced to 13 years in prison for encouraging people to take to the streets in protest today – essentially being sentenced in wake of some of the carnage that ultimately took place as a result of their encouragement.

However, what most of the main stream media did not cover about today’s protest were the events which took place online. While they may not get the popular headlines like those on the ground, this does not mean they were ineffective, went unnoticed or did not have an effect. For example, below you can find more about “Operation Catalonia” (#OpCatalionia2019), what it is all about, who was victimized by today’s attacks, as well as what hackers have done in support of this movement for the better part of the last year and a half or so – shout out to Anonymous Espana!

Learn More – #OpCatalonia:
Follow #OpCatalonia2019:

Largely lead by Anonymous CyberGuerrilla (#CgAn) and splinter groups operating under their jurisdiction this year, different Spanish-based political parties, politicians, universities, pubic businesses and more were targeted by today’s attack. Below is a confirmed list of the full run down from today’s events…..

DDoS Attacked

hxxp:// hxxp://

Information Drop

Target: Centro nacional de inteligencia
Mails Leak:

Target: Congreso
Mails Leak:

Target: Correo gob
Mails Leak:

Target: Min de defensa
Mails Leak:

Target: Poder Judicial
Mails Leak:

Target: vox
Mails Leak:


Target: hxxp:// (Hacked)

Target: hxxp:// (Hacked)

Target: hxxp:// (Hacked)

Target: hxxp:// (Hacked)

Target: hxxp://

Target: hxxp://

Target: hxxp://

Target: hxxp://segypr

Target: hxxp://

Target: hxxp://

Target: (Psoe de Burgos) hxxp://

Target: (PartidoPopular de Puertolumbreras) hxxp://

Target: (Diputacion de Granada) hxxp://

Target: (Portal de la Dirección General del Catastro) hxxp://

Infos, Date & Times – Million Mask March 2019

Admittedly, over the course of the last several years the global phenomenon known as the “Million Mask March” has slowly lost a little bit of steam in main stream society, many thanks to all those hard workers at the National Crime Centre of London and the FBI of the United States for that! But as I take a look around the hacking scene again in the fall of 2019 I can already see something is new, something is different, and can already feel a heightened sense of fervor surround this years March – November 5th 2019.

It’s hard to say what is fueling it, but what we do know is that this years movement will largely be led by many countries we wouldn’t normally have expected over previous years, such as the Sudan in Africa, Ecuador and Brasil in South America, and Hong Kong in the far East – where fervor appears to be at its highest. Talking to different members online, there are already extensive protests already lined up for the 5th there – which will surely be a sight to see.

Learn More – Million Mask March 2019:

Browsing through the list for myself, I can not help but notice that there are no events planned for New York City this year though – which is something I should have expected. Granted last November 5th it was raining and in the mid 30’s (Fahrenheit) when I showed up at the MMM 2018 on Wall Street, I was disappointed to learn that I was literally the only one present that day – aside from all the guard rails and police, that is. Perhaps it is the natural course of things, but even though the Million Mask March may be dying in some of the more legacy places around the world you might have expect it, such as New York City, it is in turn now growing in other regions you might not have never found it before. Either way, anyone and everyone interested should do what they can to support the movement and next months march, even if it means just making some flyers/signs and pinning them up around where ever you happen to live.

** EDITORS NOTE: New York City was officially added to protests list 10/14 **

Many activists are already hard at work and have just released a preliminary list of confirmed events/marches taking place on November 5th 2019, and are inviting anyone who reads to come and join them. Please note that these lists will continue to be updated and will grow over the following days and weeks, as more events are confirmed from all around the world. If you are interested in learning more about the group, march or movement itself, we have also put together a list of websites and chatroom’s for your resources – all are welcome to join/explore. You can learn more about MMM 2019, the people hosting them and the people organizing them via the links provided below – enjoy!

Pastebin Infos:
Website Backup:
Discord Server/Chat:
Follow #MMM2019 on Twitter:
Follow #MillionMaskMarch on Twitter:




Pryzraky Group Members Hack 19 Websites Across 6 Countries In Less Than 48 Hours Time

There’s really no other way to say it, but “Pryzraky” group members appear to have gone on an absolute tear this weekend, hacking 19 websites across 6 countries, across 4 continents – lol. While some of the hacks were carried out at random, including “xS1lenc3d’s” attack on Carnegie Mellon University here in the US and the online web portal of the Currency Exchange of Mexico, other hacks by “Mecz1nho Markov” and “Al1n3737” were carried out under the banners of “Operation Sudan” (#OpSudan), “Operation Venezuela” (#OpVenezuela) and “Operation Catalonia” (#OpCatalonia). Still others, including the Universidad del Norte-Financiacion and Facultad de Artes UNALUniversidad Nacional de Colombia, appear to be nothing more than helpless innocent/random victims caught up in their wrath.

Honestly, there is too much information included in the hacks/leaks to sum up all here, so I have just organized and assembled it all for you to browse for yourself. Enjoy!

Operation Venezuela:


Leak Backup:

Operation Catalonia:

C.P Siete Infantes de Lara: hxxp://
MASI – Master in Aircraft Systems Integration: hxxp://
Escola Rosalía de Castro: hxxp://

WEBSITES WITH SQLi – Hacked not Included In Leaks:


Raw Leak:
Database Download:


جامعة القضارف : hxxp://
Elrazi University: hxxp://
Website of The Presidency: hxxp:// (#TangoDown’d via DDoS Attack)

Instructions: move the txt files to the sqlmap folder and then give the command: -r sudan.txt –dbs

File Download:


Universidad del Norte-Financiacion: hxxp://
Universidad Nacional de Colombia: hxxp://

Deface Mirror:

Leak Backup:

Screen Shot from Deface:

Image may contain: one or more people and text

North America:

Target: hxxps://

Target: hxxp://

Screen Shot of Defacements:

Image may contain: one or more people and text

#OpCatalonia: An0nym0us Espana Launches Massive DDoS Campaign Against Spain’s Supreme Court & Judicial Systems

Starting early this morning, March 13th 2019, members of Anonymous in Spain and Catalonia belonging to a faction known as “Anonymous Espana” began launching a coordinated DDoS campaign against Spain’s Supreme Court and its online infrastructure. The attacks themselves are being carried out under the banned of “Operation Catalonia” (#OpCatalonia), in protest of the thousands of political prisoners currently being held by and facing trial at the hands of the Spanish Government, following the failed referendum/Independence movement throughout the course of 2017 and into 2018.

It just so happens that, at the present moment in time, thousands of political prisoners attached to this movement are currently undergoing trials – trials which are now entering their fourth week and by all accounts, not going particularly well for them. So, in protest of the Spanish Governments authoritarian approach to law enforcement and judicial proceedings, Anonymous hackers are doing what they can to stand up, raise awareness and fight the powers at be –  either through launching DDoS attacks, making postings on social media educating the international public, or hacking/leaking Government data.

Learn More About #OpCatalonia Here:

In a message attached to today’s DDoS campaign, An0nym0us Espana announced: “Let’s give a warning to the Spanish justice.. By the political pantomime they are doing in the Supreme Court.. A trial with the sentence already in question.. That’s why we decided to leave the entire Spanish judicial dome out of service.” For now, it remains to be seen if any Government systems have been hacked or breached, as well as what, if any, data the hackers have obtained.

Websites Targeted 3/13/2019:

Cogreso Genral de Poder Judicial: hxxp://
Lexnet: hxxp://
Ministerio de justicia: hxxp://
Tribunal Constitucional: hxxp://
Fiscalia: hxxp://

Digital Research Team Announces Hack of 11 Websites Across Spain, Catalonia & Venezuela, Offering To Patch Site Vulnerabilities w/ Each Leak

Over the course of the last 24 hours a new group of hackers going by the name of “Digital Research Team” has announced the release of a wide-ranging series of hacks and leaks effecting different Government agencies across Spain and Venezuela, as well as a variety of public and private colleges/universities in Spain and Catalonia. In statements made available to Rogue Media Labs, the hackers claimed that all of their hacks were “Ethical,” not malicious, and they would therefore not be disclosing any of the files or databases uncovered by the hacks to the general public – believe me, because I tried. Instead, the hackers released redacted screen shots of each and every database they managed to penetrate, tagging the effected victims with each leak to serve as proof that the hacks were in fact real.

What makes this weekends release unique was the fact that, as the hackers announced their leaks on social media, they simultaneously tagged their victims with each posting – offering to teach them how their websites and servers had been hacked, as well as how to patch them in the future. The hackers also left behind an email address along with each leak – – asking the victims to reach out to them for this very information. Not much is known about the group, but in a private message with Rogue Media Labs, Digital Research Team leader and founder “Synflod” explained how “we are just reporting vulnerabilities on websites to secure them and repair the errors in their web infrastructure. We leave our email in each publication so they can contact us faster and easier.

Implicated in today’s leaks however are Spain’s Ministry of Justice, Ministry of State, National Institute of Statistics, Institute of Mayors and Social Services, as well as the University of Malaga, Univesity of Huelva, University of CITCEA-UPC, a technological school specializing in energy, power electronics, mechatronics and enertronics, along with Rovira i Virgili University, the University of Pablo Olavide, the website of the official Chess team of the University of Oviedo and lastly, the website of the Bolivarian Government of Carabobo – led by Rafael Lacava in Venezuela.


Ministerio de Justicia: hxxp://
Ministerio de Hacienda: hxxp:/
Universidad de Malaga: hxxp://
Universidad de Huelva: hxxp://
Instituto Nacional de Estadística: hxxp://
Instituto de Mayores y Servicios Sociales: hxxp://
CITCEA-UPC: hxxps://
Universitat Rovira i Virgili: hxxp://
Universidad Pablo de Olavide: hxxp://
Universidad de Oviedo: hxxp://
Gobierno de Carabobo: hxxp://

Sample Screen Shots from Hack:

Ministerio de Justicia:

No photo description available.

Ministerio de Hacienda:

No photo description available.

Univerisdad of Malaga:

No photo description available.

Universidad d Huelva:

No photo description available.

Instituto Nacional de Estadística:

No photo description available.

Instituto de Mayores y Servicios Sociales:

No photo description available.


No photo description available.

Universitat Rovira i Virgili:

No photo description available.

Universidad Pablo de Olavide:

No photo description available.

Universidad de Oviedo:

No photo description available.

Gobierno de Carabobo – Rafael Lacava en Venezuela:

No photo description available.

#OpCatalonia: An0nym0us Espana Releases Leaks In Protest of The Continued Incarceration of Catalonian Political Prisoners

In the early morning hours of Thursday, January 24th 2019, An0nym0us Espana announced a hack and leak of 4 websites. The hacks were carried out in conjunction with something known as #OpCatatonia, an Anonymous operation launched in solidarity with the people of Catalonia as they fight for their independence from the Spanish Government – demanding that all political prisoners presently incarcerated at the hands of the Government of Spain be freed.

Among the website effected are Ilsa Fabricantes de Menage, a Spanish based online retail platform, the official web portal of the municipality of Ayuntamiento de Panticosa, the Partido Popular de Puerto Lumbreras, a Spanish based political party, as well as the Consulado Heal de. Uruguay en Islas Canarias, the public ministry of the Canary Islands. Not only were each of these websites/organizations hacked and/or defaced, but the contents of their databases were also downloaded and posted online – open/available to the public.

Website: hxxp://
Download (94.21 KB):

Website: hxxp://
Database Download (838.21 KB):

Website: hxxp://
Database Download (19.1 MB):

Website: hxxp://
Database Download (2.48 MB):
Deface Mirror:

Psoe Burgos Political Party, Spanish Chamber of Commerce & Many Others Hacked by Anonymous Espana, Databases Leaked Online

Last night “Anonymous Espana” announced the hack, leak and defacement of several websites across Spain. The cyber attacks appear to have been conducted through a combined/ collective effort of several groups and individuals, including Anonymous CyberGuerrilla and “Anon_cat.” As for the motivation behind them, look no further than #OpCatalonia – one the single largest Anonymous operations across Europe dating back to the Catalonian secession vote of 2017.

In a posting made available through Twitter on December 20th, Anonymous Espana announced the hack of 5 websites, including Psoe Burgos, a Spanish based Socialist political party, COAATMU, a Spanish tech university, the Forest Science Centre of Catalonia, the Spanish Chamber of Commerce and Abogados MMB, an international law firm based in Spain. Not only were all of these website hacked, but each of them had their online databases breached, downloaded and deleted. Anon_cat also managed to deface Psoe Burgos’ website, replacing their front page with the Anonymous logo and a message reading “HACKED BY ANONYMOUS. ALL OF YOUR DATA HAS BEEN DELETED.” As of midnight 1:00 am EST the deface of the website had remained standing for nearly 10 hours at that point, but by 9:00 am the website appears to have been restored to its original version.

Websites Hit:


Databases Leaked:

Psoe Burgos (17.1 KB):
COAATMU (3.08 MB):
Forest Science Centre of Catalonia (3.03 MB):
Spanish Chamber of Commerce (461.5 KB):
Abogados MMB (6.96 KB):


UK’s Integrity Initiative Directed by Christopher Donnelly, Funded by Institute for Statecraft, Leaked Documents Show

Last night members of Anonymous CyberGuerrilla published a new batch of leaked files and documents from inside the UK’s hybrid warfare project/programme known as the “Integrity Initiative,” shedding light into the mysterious firm financing it called the “Institute for Statecraft.” Among the dozens of leaked files found below, includes information on the Integrity Initiatives leader, Christopher Donnelly, whom also happens to be a special adviser to the House of Commons Defense Committee inside England, as well as various ‘initiatives’ undertaken by the Institute for Statecraft across various European and Eastern European countries over the years. In part, the documents explain how the Institute for Statecraft pushed support on behalf of the Catalonia riots of 2017 and attempted to launch an aggressive media campaign to incite Ukrainians to fight back against Russia’s annexation of Crimea in 2014 – among many other interesting topics.

In a press release attached to the leak, Anonymous CyberGuerrilla states that:

“Well-coordinated efforts of the Anonymous from all over the world have forced the UK politicians to react to the unacceptable and in fact illegal activity of the British government that uses public money to carry out misinformation campaigns not only in the EU, US and Canada but in the UK as well, in particular campaigns against the Labour party. The Integrity Initiative is now under first official investigation. We promise to give close scrutiny to the investigation that we believe should be conducted honestly, openly and absolutely transparently for the society, rather than become an internal and confidential case of the Foreign Office.

To show our expertise in the investigation as well as to warn the UK government that they must not even try to put it all down to the activity of some charity foundations and public organizations we reveal a part of documents unveiling the true face of The Institute for Statecraft and some information about its leadership.

Indeed, the Integrity Initiative receives its financing from The Institute for Statecraft, a company that very few knew about up until recently. Here is the information that you can get from its official website: its programme has not been updated since late 2017, no data on its employees, no contacts whatsoever, not even an official e-mail, while the source code of its online publications suggests automated uploads of the contents. And here are the documents about The Institute for Statecraft and the Integrity Initiative that we are ready to share with you:”

Private report. Reforming the Foreign Office under the supervision of the director of the Institute for Statecraft:
Twitter performance report. The Twitter account was used for the smear campaign against Jeremy Corbyn:

Skripal case related documents of the Integrity Initiative and Foreign Office:

Leaving no stone unturned – the list of experts from The Institute for Statecraft:
List of employees who attended a closed-door meeting with the white helmets:

Some invoices:

The Integrity Initiative actual monthly expenditure:

The Institute for Statecraft reporting about its publications:

The Institute for Statecraft’s skill sharing conference plan:

Below, we introduce Director of The Institute for Statecraft. Meet Christopher Donnelly.

Image may contain: 1 person

Christopher Donnelly’s passport:
Christopher Donnelly’s CV:
Donnelly’s bid for money from the MoD to handle the government, political parties, journalists, the military etc:

As a Special Adviser on the House of Commons Defence Committee Donnelly triggered an investigation of the Russian threat and lobbied for the following Integrity Initiative cluster members and employees of the Institute for Statecraft to be included as witnesses: James Sherr, Dr Bobo Lo, Peter Pomerantsev, Dr Victor Madeira, John Lough, Ben Nimmo, Keir Giles, Igor Sutyagin, Andrew Monaghan, Ben Nimmo, Françoise Thom, Lilia Shevtsova, Glen Grant, Davi Clark. Of course, he was there as well.

The information is in public domain:

Taking advantage of his administrative position, Donnelly lobbied the House of Commons Digital, Culture, Media and Sport Committee for an inquiry into Russia’s interference in the Catalan referendum. He invited members of the Integrity Initiative Spain cluster Francisco de Borja Lasheras and Mira Milosevich-Juaristi. At that moment they were receiving funds from the Foreign Office, i.e. the UK intelligence paid its own agents for fake proof of Russia’s interference in the Catalan referendum and later told them to lie to the Parliament to convince it to take anti-Russian steps.

It is also in public domain:
Donnelly’s proposal on Crimea:
Donnelly’s military initiatives:

Donnelly was responsible for inviting the military to seminars:

Donnelly invited officers of Ukrainian special services to the UK. Everything was financed by the MoD:

Josephine Willows, a senior specialist on the House of Commons Digital, Culture, Media and Sport Committee, for some reason had to reconcile the final speech of the Committee chairman with Christopher Donnelly:

Bear in mind that we are talking about the director of a public organization and not about a high-ranking officer of the British intelligence. This is only a part of the documents that we have on Christopher Donnelly. If the investigation into the Integrity Initiative’s illegal activity in the UK turns out to be nothing more than a farce, we will publish more documents proving close connections between Donnelly and UK secret services which he often employs to mislead MPs and bring his agents to meetings of various committees in the House of Commons.

As the scandal in the UK is gaining momentum, it is ever so striking that European leaders and official representatives remain so calm about the Integrity Initiative’s activity in their countries. We remind you that covert clusters made up for political and financial manipulation and controlled by the UK secret services are carrying out London’s secret missions and interfering in domestic affairs of sovereign states right in front of you.

Citizens of Scotland, France and Italy! Here is the information on Integrity Initiative’s activity in your countries:


A Scottish agent’s performance supervised by former MI-6 operative and currently an II specialist, Guy Spindler:
£12,000 that he received for the work:


Extended list of cluster members:

French cluster leader’s contracted article:

Payment for the article:
Another example of a contracted article:
Donnelly’s meetings in Paris:
Johanna Möhring’s meetings in Paris:
Avisa Partners PR Presentation. It receives financing from the UK intelligence:
Its programme:


Italian cluster leader’s report:
Payments for performance in Italy:
Skripal case coverage in Italy:

This is another part of documents that we have on the Integrity Initiative. We do not change the goals of this operation. When we return with the next portion of revelations, names and facts depends on how seriously the UK and EU leaders take our intentions this time.

We are Anonymous.

We are legion.

We do not forgive.

We do not forget.

Expect us.

Original Copy of The Leak Found Here:
Backup Locations for Leaked Documents: