Is The TalkTalk Hack a Jihadist Attack?

 

Rumours have circulated on social media about the notorious LulzSec hacking group being responsible for breaking in to the telecoms company TalkTalk’s customer data.  Now, Islamic extremists have claimed responsibility for the hack on the UK broadband provider, revealing another strand in the web of funding that pays for a campaign of terror.
 
Jihadists who have also claimed responsibility for the massive hack attack on broadband provider TalkTalk claim to have begun their 'cyber holy war' on the UK. Russian-based Islamic extremists said they were the ones who carried out the “significant and sustained cyber attack” on the British company.

Their claims come after TalkTalk boss Dido Harding said she had received a ransom message.
She said: "I personally received a contact from someone purporting, as I say I don’t know whether they are or are not, to be the hacker looking for money."

And then hours later the Jihadi cyber hackers shared a message online that read: "We have made our tracks untraceable through onion routing, encrypted chat messages, private key emails, hacked servers.
"We will teach our children to use the web for Allah. Your hands will be covered in blood. Judgement Day is soon."
 
TalkTalk admits that it does not know how many customers are affected - nor if their personal data is encrypted.
But it is now feared that the attack could be one of many examples in which terror groups like ISIS fund their sick crimes.
British OAPs are being duped by jihadist cold-callers to help fund terrorism in the Middle East.

The London-based tricksters - who may or may not be acting independently of the supposed hackers - pose as police or bank staff and claim their victim’s account is compromised, before sending fake couriers to collect bank cards and details. Their cash is then plundered, the Financial Action Task Force has warned. Some people in Devon, Cornwall, Dorset, Bedfordshire, Kent and London, have been hit so far. But these hacks cannot be carried out by anyone - terror organisations need to recruit experts.

Scores of computer experts, are thought to have been recruited by ISIS, to plunder millions from UK banks and businesses in recent months. The jihadist group spreading death and mayhem across Iraq and Syria is already the world’s richest rebel organisation with more than £1.5billion at its disposal.

British hacker Junaid Hussain, 20, jailed in 2012 for stealing personal information from Tony Blair and posting it online, was thought earlier this year to have been masterminding a plan to bring in countless millions more.

Hussain, from Birmingham, travelled to Syria last year while supposedly under police supervision. He was believed to be teaching other hackers how to crack the code used to safeguard passwords and sensitive information - however reports in August claimed that he was killed in a US airstrike. 

The hackers haven't just targeted TalkTalk.They're known to have gone after big accounts belonging to businesses, VIPs and celebrities from around the world. Last year, a source told the Mirror: "This is a new dawn of warfare. This is not a sporadic operation.

"The hackers are targeting the accounts of the rich and famous, VIP clients of banks and big businesses. This is an international fraud on an unprecedented scale and the result could be a bottomless pit of money to fund their campaign of terror."

Thanks to the instability in the region, ISIS militants were able to seize control of large Syrian oil fields. This has allowed the terror group to trade with middlemen hoping to make a large amount of cash. But authorities say they are trying to crack down on those involved in oil trade with ISIS.
"The middlemen, traders, refiners, transport companies, and anyone else that handles [ISIS's] oil should know that we are hard at work identifying them, and that we have tools at hand to stop them," David Cohen, the undersecretary for terrorism and financial intelligence at the US treasury, has said.

In the aftermath of the US invasion of Iraq, Sunni militants joined with Saddam Hussein’s former generals to form a powerful alliance which has gone on to become ISIS. An alliance whose tentackes extend into cyberspace and directly into the homes  and bank accounts of TalkTalk's British customers.

Ein News:http://http://bit.ly/1jNh5fb

 

 

 

« Cyber Warfare: Regional Is Becoming Global
Major Cybersecurity Bill Clears US Senate »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Gamma

Gamma

Gamma is a leading provider of Unified Communications as a Service (UCaaS) into the UK, Dutch, Spanish and German business markets.

Teneo

Teneo

Teneo is a Solutions Provider focused on reducing complexity. We combine leading technology with deep expertise to create new ideas on how to simplify IT operations.

Fornetix

Fornetix

Fornetix is a cybersecurity platform enabling Zero Trust while delivering critical encryption automation, access controls, authorization services, machine identity, and ICAM solutions,

LEPL Cyber ​​Security Bureau - Georgia

LEPL Cyber ​​Security Bureau - Georgia

The aim of the LEPL Cyber Security Bureau is to create and strengthen stable, efficient and secure systems of information and communications technologies.

Cyber NYC

Cyber NYC

Cyber NYC is a suite of strategic investments to grow New York City’s cybersecurity workforce, help companies drive innovation, and build networks and community spaces.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Informer

Informer

Informer provides an Attack Surface Management SaaS platform alongside penetration testing services. We combine machine learning and human intelligence to reduce cyber risk.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Cheops Technology

Cheops Technology

Cheops is a specialist in IT Business Technology Services. We help SMEs and large companies build, optimize and manage their IT so they can focus on their core business.

443ID

443ID

443ID brings OSINT data to Identity Security professionals on any digital platform.

Q5id

Q5id

At Q5id, we prove that your customers' digital identity and real-world identity are the same, our verification and authentication solution delivers a Proven and Secure digital identity for everyone.

Questex Asia Total Security Conference

Questex Asia Total Security Conference

Questex Asia’s Total Security Conferences is one of the industry’s most prestigious and engaging forums for the region's top information security leaders and business decision-makers.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

Standard Notes

Standard Notes

Standard Notes is a secure digital notes app that protects your notes and files with audited, industry-leading end-to-end encryption.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.