Anonymous Threaten ISIS After Belgium Attacks

Just like last November, after the Paris terror attacks, Anonymous has come forward and issued a threat against the Islamic State terrorist group, warning of impending cyber-attacks.

In a video posted on YouTube, the group says, "We have fought daily against terrorism and we have silenced thousands of Twitter accounts directly linked to ISIS."

"We severely punished Daesh on the Darknet, hacked their electronic portfolio, and stole money from the terrorists. We have laid siege to your propaganda websites, tested them with our cyber attacks," the group also adds.

All of their statements are accurate since we have reported on many of the incidents in the past months. Unfortunately, outside a simple reaction from ISIS, which called the hackers "idiots," the terror group has hardly been affected by Anonymous' actions.

Despite taking down over 125,000 Twitter accounts, ISIS has retained a strong online presence, and just as one account was taken down, another one was also set up.

No matter Anonymous' good intentions, their strategy of hacking propaganda sites and reporting Twitter accounts has barely put a dent in the group's real-world activities, and as proof stand yesterday's attacks in Brussels, Belgium.

Sure, it may be nice to see headlines of "Anonymous pwns ISIS" once in a while, but these attacks are hardly wounding Daesh's activities in any way, and the group may need to look for other methods of sabotaging Daesh, or just leave it in the hands of official investigators.

A bigger role in sabotaging ISIS had one disgruntled Daesh member who stole a list containing the real identities of 22,000 ISIS members when he left the group.

Softpedia

« NSA Hacked Penatgon Command-Control In 4 Days
Driverless Truck Convouys To Get UK Trials »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

AV Test

AV Test

The AV-TEST Institute is a leading international and independent service provider in the fields of anti-virus research and IT security.

Softtek

Softtek

Softtek provides comprehensive software Quality Assurance and Testing that identifies the correctness, completeness, and quality level of software products.

Code Dx

Code Dx

Code Dx is a software application vulnerability correlation and management system.

L J Kushner & Associates

L J Kushner & Associates

L.J. Kushner is a leading Information Security recruiting firm.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Silensec

Silensec

Silensec is a management consulting, technology services and training company specialized in information security.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

Newtech Recycyling

Newtech Recycyling

Newtech Recycyling specializes in the removal and disposal of IT infrastructure which has reached the end of its life cycle.

Google for Startups

Google for Startups

Google for Startups is Google’s initiative to help startups thrive across every corner of the world.

McIntyre Associates

McIntyre Associates

McIntyre Associates is an Executive Search boutique specialized in recruiting for the Cybersecurity industry. Our clients range from Venture Capital backed startups to Fortune 100 companies.

3i Infotech

3i Infotech

3i Infotech offers consulting & professional services to assess, design and build next gen IT infrastructure, and managed services to operate, optimize and continuously improve.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Akto

Akto

Akto, the plug & play API security platform. Discover your APIs, run tests and find business logic vulnerabilities at ludicrous speed.

Bores Security Consultancy

Bores Security Consultancy

Bores Security Consultancy are an established family-run business delivering expertise in security and technology.