Anonymous Want Revenge For Saudi Executions

Hackers have targeted Saudi Arabia's Ministry of Defence website with a sustained DDoS attack

Saudi Arabia’s defence websites have been hit by hackers, forcing several of them offline for more than 24 hours. Reports in Iran claim that the cyberattack was a response to the execution of leading Shia cleric Sheikh Nimr Baqir al-Nimr in Saudi Arabia, while members of the hacktivist collective Anonymous have taken credit for the shut downs.

source: Al Jazeera+

Hackers conducted a massive distributed denial of service (DDoS) attack against the Saudi Arabian Ministry of Defence website, which was still down at the time of publication. Such attacks work by flooding the target server with web traffic, usually stemming from a botnet, in order to overload it and force it offline.

The execution of Nimr, an outspoken critic of the Sunni kingdom, led Iran's supreme leader Ayatollah Ali Khamenei to say Saudi Arabia faced "divine vengeance" for Nimr's "unjustly spilled blood". The decision to execute Nimr was also condemned by the US, UN and EU.

Iran's Fars News Agency reported that the DDoS attack was carried out by a group called "Brave Youth Against Religious and Holy Taboos".

In a statement obtained by Fars, the hackers said: "We will continue defending the religious sanctities and also targeting the enemies and oppressors involved in the killing of the freedom-seekers and revolutionaries."

Several Twitter accounts associated with Anonymous have taken credit for the attack, referring to it as part of Operation Nimr (#OpNimr). The amorphous group also targeted Saudi government websites in September in response to the state's decision to behead and crucify 21-year-old Ali Mohammed al-Nimr, the nephew of Sheikh al-Nimr. A date for his execution is yet to be set.

IB Times: 

« Russian Hackers Warn EU Trains Are Vulnerable to Hijack
Hefty Fine Over False Encryption Claims »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Telefonica Tech

Telefonica Tech

Telefónica Cyber Security Tech is focused on the prevention, detection and appropriate response to security incidents aimed at protecting your digital services.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

Telecom Information Sharing and Analysis Center Japan (T-ISAC Japan)

T-ISAC Japan coordinates information sharing and activities related to ISP/telecommunications network security in Japan.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

SCIPP International

SCIPP International

SCIPP’s courses are based on internationally recognized best business practices for security awareness, for both technical and non-technical staff and to comply with regulatory mandates.

Fingerprint Cards

Fingerprint Cards

Fingerprint Cards develops and produces biometric components and technologies that verify a person’s identity through the analysis and matching of an individual’s unique fingerprint.

Arab Information & Communication Technologies Organization (AICTO)

Arab Information & Communication Technologies Organization (AICTO)

The Arab ICT Organization (AICTO) is an Arab governmental organization working under the aegis of the league of Arab States.

Jandnet Recruitment

Jandnet Recruitment

Jandnet Recruitment is a small specialist company working in the IT sector. We recruit across all IT disciplines including cyber security and digital identity.

Alpine Security

Alpine Security

Alpine Security provides penetration testing, security assessments and cybersecurity training services.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

neoEYED

neoEYED

neoEYED helps banks and fintech to detect and prevent frauds using a Behavioral AI that recognizes the users just by looking at “how” they interact with the applications.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

Atlas VPN

Atlas VPN

Atlas VPN is a highly secure freemium VPN service with a goal to make safe and open internet accessible for everyone.

Ark Technology Consultants

Ark Technology Consultants

Ark Technology Consultants is a unique IT Services Firm which blends technology solutions with consultative insight around governance and process management.

Rapifuzz

Rapifuzz

At Rapifuzz, our goal is to help organizations test and secure their APIs enabling trust, innovation and Seamless Secured Digital Experiences.

Auria

Auria

Auria advances complex space, missile, and cyber operations with visionary solutions and software.