The group, known as SiegedSec, declared on Monday that it had removed 8 gigabytes of internal data from the Arkansas and Kentucky governments in an effort to penalize them for regulating abortion after the reversal of Roe v. Wade.
Although, the group announced these two states will not be the only ones.
"THE ATTACKS WILL CONTINUE!" the group announced in a Telegram post declaring the data release. "Our main targets are any pro-life entities, including government servers of the states with anti-abortion laws."
While the hacker group has not declared its following targets, the results of its government hack have been lackluster.
WATCH: 1940'S FOOTAGE OF THE TALLEST MAN TO EVER LIVE
"Information pertaining to Kentucky has been identified, and while initial indications are that this is publicly available data that does not include personally identifying information, the state will continue its investigation," Crystal Staley, a spokeswoman for Kentucky Gov. Andy Beshear, a Democrat, explained to the Record.
BRIDGING THE GAP: ONE PROGRAM'S MISSION TO CONNECT YOUTH ACROSS AMERICA'S RED AND BLUE DIVIDE
Arkansas officials echoed these notions, declaring that the released data were not as private as the hackers implied. Government officials "became aware that a so-called hacktivists group claimed to have accessed and downloaded internal documents from the State of Arkansas systems," announced Shealyn Sowers, a spokeswoman for Arkansas Gov. Asa Hutchinson, a Republican. "After initial analysis, our security teams have determined that there was no access beyond what is publicly available, and only public record data was seen or downloaded."
WATCH: THIS IS A TEACHER! LISTEN TO HIM ADVOCATE FOR MORE RACISM
The systems in question “did not sit on the state of Arkansas network but rather in a public cloud provider," Sowers stated. "We continue to remain vigilant as we go about the process of keeping our systems secure.”
TURKISH PRESIDENT'S DANGEROUS GAME: HOW HIS SUPPORT FOR HAMAS IS TESTING NATO'S LIMITS
SiegedSec allegedly formed in late February 2022, according to security analysis firm DarkOwl. The organization has defaced and compromised no less than 11 websites with "crude and juvenile" language and graphics, as well as several thousand compromised LinkedIn profiles.
ISRAELI MILITARY INTELLIGENCE CHIEF STEPS DOWN FOLLOWING MAJOR OCTOBER 7 FAILURE
The group has further supposedly gained access to sensitive information from at least 30 different companies since its founding.
Representatives from Kentucky and Arkansas did not respond to requests for comment from the Washington Examiner.
FAITH, KNOWLEDGE, AND EXCELLENCE: CATHOLIC HIGHER EDUCATION STEPPING IT UP AMID WOKE CULTURE
Hacktivists have long taken matters into their own hands, yet the practice has grown in importance since the Russian attack on Ukraine. Thousands have joined either side, targeting critical infrastructure and data-laden government organizations with distributed denial-of-service attacks and more.