LONDON (AFP)— A group of hackers vowed on Thursday to intensify a “war of data” against Mastercard, Visa and other groups which have cut funding to the WikiLeaks website over its release of US secrets.

The group “Anonymous” has claimed credit for bringing down the websites of the two firms after they suspended payments to WikiLeaks, and for attacking the site of a Swiss bank that closed an account of site founder Julian Assange, who is being held in the UK.

“The campaign is not over. It’s still going strong, more and more people are joining and helping in. Just last night Visa went down for a brief period,” an unofficial spokesman for the group, calling himself “Coldblood”, told BBC Radio.

“I see this as becoming a war but not your conventional war. This is a war of data, we are trying to keep the Internet open and free for everyone, just the way the Internet has been and always was.”

Coldblood, who speaks with a British accent and says he is a software engineer, said Anonymous was “targeting mainly companies which have decided for whatever reason not to deal with WikiLeaks”.

“Some of the main targets involve Amazon, Mastercard, Visa and PayPal.”

He said more people were downloading a so-called “voluntary botnet tool” which allows people to overload the servers of targeted groups.

The same tactic has been employed by unknown opponents of WikiLeaks itself in a bid to drive the website offline.

WikiLeaks supporters reportedly also shut down the website of the government of Sweden overnight, though there was no immediate claim of responsibility from Anonymous.

Assange, a 39-year-old Australian, is being held in a London prison pending a hearing on extradition to Sweden, where he is wanted for questioning over rape and sexual assault allegations.

Explore More

How to Hack Windows XP Computer Passwords

1. Know that if you are still logged on to the Administrator account you can change user profiles using the following steps. * Go to the green “Start Button” and

What are snort rules?

Snort rules are the conditions specified by a Network Administrator that differentiate between normal Internet activities and malicious activities. Snort rules are made up of two basic parts: * Rule

EU Police learning hacking tricks. They are about to “Remote search” your PCs.

Law enforcement at European Union is working on ethical hacking proposal that will allow them to remotely access and monitor any PC without warrant. This is adopted after a decision