IS Forms Mega Hacking Group

Hackers supporting Islamic State terrorist group have joined hands with other terrorist supporting groups to form a joint team and collectively target the cyberspace in the West. 

The super hacking unit is labeled United Cyber Caliphate (UCC) – The terrorist group announced this news on their groups on the Telegram messaging app.

January 2016 was the time when the previous merger happened on similar lines when AnonGhost and CCA fused together to threaten western cyber interests. AnonGhost is a hacking group which was previously associated with Anonymous but detached itself from them after #OpISIS when the terrorist group attacked Charlie Hebdo headquarters in Paris.

The merged alliance also used hashtag called “#KillCrusaders” and sustained its anti-Christians campaign which earlier ruined a Michigan church website after leaving behind an ISIS propaganda message. The UCC encompasses Cyber Caliphate Army (CCA), ISIS’s central hacking unit, and other pro-ISIS groups identical to Sons Caliphate Army (SCA) and Kalacnikov.TN (KTN).

Post-merger UCC the pro-ISIS conducted several successful cyber-attacks including the hacking of Newsweek’s Twitter account, website, Facebook account and live transmission of French TV Station and the British Broadcasting Corporation (BBC). The group also threatened the US and West of an ‘Electronic Holocaust.’ 

The group also leaked a hit list of alleged US military, and security officials, as their next target. Another list of 1500 security professional was circulating online which, was also leaked by the terrorist group. 

However, the group had a setback when their top hackers Junaid Hussain aka TriCk of TeaMp0isoN was killed in a drone strike in Syria.
Hackread: http://bit.ly/1QYgPC4

 

« Hit By DDoS? You Will Be Hit Again…
Spying On You In Britain »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infoblox

Infoblox

Infoblox solutions help businesses automate complex network control functions to reduce costs, increase security and maximize uptime.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Intruder

Intruder

Intruder is a cloud-based vulnerability scanner that finds cyber security weaknesses in your digital infrastructure, to avoid costly data breaches.

BackBox Software

BackBox Software

BackBox is a leading provider of solutions for automated backup and recovery software for security and network devices.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

CERT-UA

CERT-UA

CERT-UA is the national Computer Emergency Response Team for Ukraine.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Learning Tree International

Learning Tree International

Learning Tree's comprehensive cyber security training curriculum includes specialised IT security training and general cyber security courses for all levels of your organisation including the C-suite.

American Cybersecurity Institute

American Cybersecurity Institute

American cybersecurity Institute is a newly formed not-for-profit organization dedicated to education, advocacy, study and analysis in the space of cybersecurity law and policy.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

Futurae Technologies

Futurae Technologies

Futurae - enabling trust and invisible security for your users on all devices and applications. Strong customer authentication (SCA) made easy.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Cyber Command - Romania

Cyber Command - Romania

Cyber Command represents the military authority responsible for the development, protection and resilience of military IT networks and services that support the Romanian Force Structure.

VulnCheck

VulnCheck

VulnCheck helps organizations outpace adversaries with vulnerability intelligence that predicts avenues of attack with speed and accuracy.

Exacom

Exacom

Exacom is a leading provider of multimedia logging/recording solutions across public safety, government, DoD, energy, utilities, transportation, and security applications.