ISIS Hack The Wrong Google

Hackers affiliated with the Islamic State militant group (ISIS) who promised to take down Google appear to have mistakenly attacked the wrong target.

The so-called Caliphate Cyber Army (CCA) announced plans on the secure messaging app Telegram to hack Google; however, Google services appear to have been unaffected.

“We promised to hack Google,” stated a message that was posted to a Telegram channel used by the CCA. “Keep the promise Inshallah [God willing], expect us today.”

Instead, the website of Add Google Online was defaced with ISIS imagery and a message stating, “hacked by CCA”. A French-language Islamic State song also played, promising: “We will kill you without pity… for Allah alone we wear suicide belts.” 
 
The site, registered to Indian firm Always Say, offers search engine optimization (SEO) services to local businesses but is not connected with Google.

The attack on Add Google Online follows similar attacks by CCA on seemingly arbitrary targets, including a small solar energy company in England, a Japanese dance instructor, and a laminate flooring firm based in Wales.

Michael Smith, an advisor to the US Congress and co-founder of national security firm Kronos Advisory, believes the increase in frequency of attacks carried out by ISIS Hackers signals an increase in the group’s cyber capabilities. Despite the relatively small size of recent targets, Smith also claims they demonstrate ISIS has achieved more sophisticated capabilities to damage its enemies’ interests than Al-Qaeda.

“I expect these activities will become more common,” Smith tells Newsweek. “Plus, we can reasonably expect to see their hackers’ focus widen from breaking into government systems to collect information about military, intelligence, diplomatic and law enforcement officials to doing more dynamic things like attacking critical infrastructure systems.”
Newsweek: http://bit.ly/1RDfAMc

 

« UK Government Goes Ahead With Revised Surveillance Bill
Pentagon Starts Aggressive Cyberwar Against ISIS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

FireEye

FireEye

FireEye delivers unmatched detection, protection and response technology through an extensible and flexible cloud-based XDR platform.

CERT-MU

CERT-MU

CERT-MU is the Mauritian National Computer Security Incident Response Team.

Cambridge Intelligence

Cambridge Intelligence

Cambridge Intelligence are experts in network visualization and finding hidden trends in complex connected data. Applications include cybersecurity.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

FarrPoint

FarrPoint

FarrPoint is a specialist telecoms consultancy providing a range of services including cyber security assessments and technical assurance to safeguard your data.

Modux

Modux

Modux focus on a number of core competencies across cyber security including; cyber intelligence & analytics, penetration testing and training.

Penacity

Penacity

Penacity, LLC provides strategic consulting technology services and Information Security Services to commercial and government organizations.

InGuardians

InGuardians

InGuardians is an independent information security consulting firm specializing in penetration testing, threat hunting, and hardware hacking.

Stealth Software Technologies

Stealth Software Technologies

Stealth Software Technologies is focused on the generation of research and software products focused on applied cryptography and cybersecurity.

Dataships

Dataships

We help companies automate their privacy compliance while building healthy, transparent data relationships with their customers.

Central Intelligence Agency (CIA)

Central Intelligence Agency (CIA)

The CIA is an independent agency responsible for providing national security intelligence to senior US policymakers. This includes cyber security related activities.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.

American Binary

American Binary

American Binary is a Quantum Safe Networking (TM) and post-quantum encryption company.

BreakPoint Labs

BreakPoint Labs

BreakPoint Labs is dedicated to providing the methods and means for sustainable, measurable, and effective cybersecurity operations.

GoCloud Systems

GoCloud Systems

GoCloud is an IT consulting firm. We provide IT strategy and cloud adoption services to the New Zealand Government, Non-Profit Organisations and private industry.