The malicious campaign, orchestrated by hacktivist groups from various countries, utilized tactics such as DDoS attacks, defacement attacks, and user account takeovers