LONDON (AFP)— A group of hackers vowed on Thursday to intensify a “war of data” against Mastercard, Visa and other groups which have cut funding to the WikiLeaks website over its release of US secrets.

The group “Anonymous” has claimed credit for bringing down the websites of the two firms after they suspended payments to WikiLeaks, and for attacking the site of a Swiss bank that closed an account of site founder Julian Assange, who is being held in the UK.

“The campaign is not over. It’s still going strong, more and more people are joining and helping in. Just last night Visa went down for a brief period,” an unofficial spokesman for the group, calling himself “Coldblood”, told BBC Radio.

“I see this as becoming a war but not your conventional war. This is a war of data, we are trying to keep the Internet open and free for everyone, just the way the Internet has been and always was.”

Coldblood, who speaks with a British accent and says he is a software engineer, said Anonymous was “targeting mainly companies which have decided for whatever reason not to deal with WikiLeaks”.

“Some of the main targets involve Amazon, Mastercard, Visa and PayPal.”

He said more people were downloading a so-called “voluntary botnet tool” which allows people to overload the servers of targeted groups.

The same tactic has been employed by unknown opponents of WikiLeaks itself in a bid to drive the website offline.

WikiLeaks supporters reportedly also shut down the website of the government of Sweden overnight, though there was no immediate claim of responsibility from Anonymous.

Assange, a 39-year-old Australian, is being held in a London prison pending a hearing on extradition to Sweden, where he is wanted for questioning over rape and sexual assault allegations.

Explore More

LDAP Injection Vulnerabilities

LDAP Injection Overview LDAP Injection attacks are not as common as the other types of injection attacks, but if your product uses an LDAP server this must be tested. An

What are the countermeasures against database attacks?

The following are the countermeasures against database attacks: * Input Sanitization: The Database Administrator must sanitize any input received from a user. The data submitted should be checked for data

The Internet or Cyber Laws

Internet is a behemoth, cutting across physical country boundaries and accessible to anyone and everyone from any corner of the world. Precisely due to this pervading nature, Internet is not