Is The TalkTalk Hack a Jihadist Attack?

 

Rumours have circulated on social media about the notorious LulzSec hacking group being responsible for breaking in to the telecoms company TalkTalk’s customer data.  Now, Islamic extremists have claimed responsibility for the hack on the UK broadband provider, revealing another strand in the web of funding that pays for a campaign of terror.
 
Jihadists who have also claimed responsibility for the massive hack attack on broadband provider TalkTalk claim to have begun their 'cyber holy war' on the UK. Russian-based Islamic extremists said they were the ones who carried out the “significant and sustained cyber attack” on the British company.

Their claims come after TalkTalk boss Dido Harding said she had received a ransom message.
She said: "I personally received a contact from someone purporting, as I say I don’t know whether they are or are not, to be the hacker looking for money."

And then hours later the Jihadi cyber hackers shared a message online that read: "We have made our tracks untraceable through onion routing, encrypted chat messages, private key emails, hacked servers.
"We will teach our children to use the web for Allah. Your hands will be covered in blood. Judgement Day is soon."
 
TalkTalk admits that it does not know how many customers are affected - nor if their personal data is encrypted.
But it is now feared that the attack could be one of many examples in which terror groups like ISIS fund their sick crimes.
British OAPs are being duped by jihadist cold-callers to help fund terrorism in the Middle East.

The London-based tricksters - who may or may not be acting independently of the supposed hackers - pose as police or bank staff and claim their victim’s account is compromised, before sending fake couriers to collect bank cards and details. Their cash is then plundered, the Financial Action Task Force has warned. Some people in Devon, Cornwall, Dorset, Bedfordshire, Kent and London, have been hit so far. But these hacks cannot be carried out by anyone - terror organisations need to recruit experts.

Scores of computer experts, are thought to have been recruited by ISIS, to plunder millions from UK banks and businesses in recent months. The jihadist group spreading death and mayhem across Iraq and Syria is already the world’s richest rebel organisation with more than £1.5billion at its disposal.

British hacker Junaid Hussain, 20, jailed in 2012 for stealing personal information from Tony Blair and posting it online, was thought earlier this year to have been masterminding a plan to bring in countless millions more.

Hussain, from Birmingham, travelled to Syria last year while supposedly under police supervision. He was believed to be teaching other hackers how to crack the code used to safeguard passwords and sensitive information - however reports in August claimed that he was killed in a US airstrike. 

The hackers haven't just targeted TalkTalk.They're known to have gone after big accounts belonging to businesses, VIPs and celebrities from around the world. Last year, a source told the Mirror: "This is a new dawn of warfare. This is not a sporadic operation.

"The hackers are targeting the accounts of the rich and famous, VIP clients of banks and big businesses. This is an international fraud on an unprecedented scale and the result could be a bottomless pit of money to fund their campaign of terror."

Thanks to the instability in the region, ISIS militants were able to seize control of large Syrian oil fields. This has allowed the terror group to trade with middlemen hoping to make a large amount of cash. But authorities say they are trying to crack down on those involved in oil trade with ISIS.
"The middlemen, traders, refiners, transport companies, and anyone else that handles [ISIS's] oil should know that we are hard at work identifying them, and that we have tools at hand to stop them," David Cohen, the undersecretary for terrorism and financial intelligence at the US treasury, has said.

In the aftermath of the US invasion of Iraq, Sunni militants joined with Saddam Hussein’s former generals to form a powerful alliance which has gone on to become ISIS. An alliance whose tentackes extend into cyberspace and directly into the homes  and bank accounts of TalkTalk's British customers.

Ein News:http://http://bit.ly/1jNh5fb

 

 

 

« Cyber Warfare: Regional Is Becoming Global
Major Cybersecurity Bill Clears US Senate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

Lookout

Lookout

Lookout is the data-centric cloud security company that uses a defense-in-depth strategy to address the different stages of a modern cybersecurity attack.

GSMA - IoT Security Guidelines

GSMA - IoT Security Guidelines

GSMA has created a set of security guidelines for the benefit of service providers who are looking to develop new IoT products and services.

Alan Boswell Group

Alan Boswell Group

We are a Group of Companies providing specialist Insurance Broking and Risk Management advice and services including Cyber Risk cover.

Internet Security Research Group (ISRG)

Internet Security Research Group (ISRG)

ISRG's mission is to reduce financial, technological, and educational barriers to secure communication over the Internet.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center (NCSC) - Vietnam

National Cyber Security Center of Vietnam has a central monitoring function and is a technical focal point for monitoring and supporting information security for people, businesses and systems.

Cyber Legion

Cyber Legion

Cyber Legion Ltd is a UK-based Cyber Security as a Service (CSaaS) start-up that provides IT security testing services to various organizations around the globe.

Securonix

Securonix

Securonix delivers a next generation security analytics and operations management platform for the modern era of big data and advanced cyber threats.

CyFlare

CyFlare

CyFlare’s security platform integrates your tools with ours – delivering true positives, automated remediation, and interactive analytics built for security management teams.

SecurWeave

SecurWeave

SecurWeave's Configurable Hardware Enforced Safety and Security (CHESS) platform has been designed to meet the security and safety criticality needs of the evolving digital industry.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Reach Security

Reach Security

Reach is the first generative AI platform purpose-built to empower enterprise security teams. With Reach, organizations measure, manage, and improve their enterprise security posture at scale.

XeneX

XeneX

XeneX Cloud Security Services address enterprise-class security challenges by enabling DevOps and Security teams to access a shared source of truth.

SKADI Cyber Defense

SKADI Cyber Defense

At SKADI Cyber Defense, we specialize in enterprise-grade cybersecurity solutions tailored for small to medium businesses.

Soteria Communications

Soteria Communications

Soteria Communications supports clients to prepare for and manage crises, with a focus on cyber incidents.