Is The TalkTalk Hack a Jihadist Attack?

 

Rumours have circulated on social media about the notorious LulzSec hacking group being responsible for breaking in to the telecoms company TalkTalk’s customer data.  Now, Islamic extremists have claimed responsibility for the hack on the UK broadband provider, revealing another strand in the web of funding that pays for a campaign of terror.
 
Jihadists who have also claimed responsibility for the massive hack attack on broadband provider TalkTalk claim to have begun their 'cyber holy war' on the UK. Russian-based Islamic extremists said they were the ones who carried out the “significant and sustained cyber attack” on the British company.

Their claims come after TalkTalk boss Dido Harding said she had received a ransom message.
She said: "I personally received a contact from someone purporting, as I say I don’t know whether they are or are not, to be the hacker looking for money."

And then hours later the Jihadi cyber hackers shared a message online that read: "We have made our tracks untraceable through onion routing, encrypted chat messages, private key emails, hacked servers.
"We will teach our children to use the web for Allah. Your hands will be covered in blood. Judgement Day is soon."
 
TalkTalk admits that it does not know how many customers are affected - nor if their personal data is encrypted.
But it is now feared that the attack could be one of many examples in which terror groups like ISIS fund their sick crimes.
British OAPs are being duped by jihadist cold-callers to help fund terrorism in the Middle East.

The London-based tricksters - who may or may not be acting independently of the supposed hackers - pose as police or bank staff and claim their victim’s account is compromised, before sending fake couriers to collect bank cards and details. Their cash is then plundered, the Financial Action Task Force has warned. Some people in Devon, Cornwall, Dorset, Bedfordshire, Kent and London, have been hit so far. But these hacks cannot be carried out by anyone - terror organisations need to recruit experts.

Scores of computer experts, are thought to have been recruited by ISIS, to plunder millions from UK banks and businesses in recent months. The jihadist group spreading death and mayhem across Iraq and Syria is already the world’s richest rebel organisation with more than £1.5billion at its disposal.

British hacker Junaid Hussain, 20, jailed in 2012 for stealing personal information from Tony Blair and posting it online, was thought earlier this year to have been masterminding a plan to bring in countless millions more.

Hussain, from Birmingham, travelled to Syria last year while supposedly under police supervision. He was believed to be teaching other hackers how to crack the code used to safeguard passwords and sensitive information - however reports in August claimed that he was killed in a US airstrike. 

The hackers haven't just targeted TalkTalk.They're known to have gone after big accounts belonging to businesses, VIPs and celebrities from around the world. Last year, a source told the Mirror: "This is a new dawn of warfare. This is not a sporadic operation.

"The hackers are targeting the accounts of the rich and famous, VIP clients of banks and big businesses. This is an international fraud on an unprecedented scale and the result could be a bottomless pit of money to fund their campaign of terror."

Thanks to the instability in the region, ISIS militants were able to seize control of large Syrian oil fields. This has allowed the terror group to trade with middlemen hoping to make a large amount of cash. But authorities say they are trying to crack down on those involved in oil trade with ISIS.
"The middlemen, traders, refiners, transport companies, and anyone else that handles [ISIS's] oil should know that we are hard at work identifying them, and that we have tools at hand to stop them," David Cohen, the undersecretary for terrorism and financial intelligence at the US treasury, has said.

In the aftermath of the US invasion of Iraq, Sunni militants joined with Saddam Hussein’s former generals to form a powerful alliance which has gone on to become ISIS. An alliance whose tentackes extend into cyberspace and directly into the homes  and bank accounts of TalkTalk's British customers.

Ein News:http://http://bit.ly/1jNh5fb

 

 

 

« Cyber Warfare: Regional Is Becoming Global
Major Cybersecurity Bill Clears US Senate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

e-Governance Academy (eGA)

e-Governance Academy (eGA)

eGA is a think tank and consultancy founded for the transfer of knowledge and best practice in e-governance, e-democracy and national cyber security.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

Approachable Certification

Approachable Certification

Approachable Certification is a UKAS accredited certification body offering down-to-earth and competitively priced audits against ISO Management Systems standards.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

PizzlySoft

PizzlySoft

PizzlySoft is a global company that is seeking convergence of network and security / software and hardware. We put our value on creating the best security.

Netenrich

Netenrich

The Netenrich operations intelligence platform is built from the ground up to help enterprises resolve everyday and futuristic problems for stable, secure environments and infrastructures.

3B Data Security

3B Data Security

3B Data Security offer a range of Penetration Testing, Digital Forensics, Incident Response and Data Breach Management Services.

Theta

Theta

Theta is a New Zealand owned technology consultancy. Our team of over 330 experienced professionals help organisations transform with technology.

ZoobeTek

ZoobeTek

ZoobeTek are a company focused on preventing leaks related to the security of business information3.

Nortal

Nortal

Nortal is a strategic digital transformation partner for leading companies and governments around the world.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Frontier Technology Inc. (FTI)

Frontier Technology Inc. (FTI)

Frontier Technology Inc provides the technology and deep data expertise to drive the best defense and intelligence solutions.

Vonahi Security

Vonahi Security

Vonahi Security is a cybersecurity SaaS company that pioneered automated network penetration testing.