ISIS Hack The Wrong Google

Hackers affiliated with the Islamic State militant group (ISIS) who promised to take down Google appear to have mistakenly attacked the wrong target.

The so-called Caliphate Cyber Army (CCA) announced plans on the secure messaging app Telegram to hack Google; however, Google services appear to have been unaffected.

“We promised to hack Google,” stated a message that was posted to a Telegram channel used by the CCA. “Keep the promise Inshallah [God willing], expect us today.”

Instead, the website of Add Google Online was defaced with ISIS imagery and a message stating, “hacked by CCA”. A French-language Islamic State song also played, promising: “We will kill you without pity… for Allah alone we wear suicide belts.” 
 
The site, registered to Indian firm Always Say, offers search engine optimization (SEO) services to local businesses but is not connected with Google.

The attack on Add Google Online follows similar attacks by CCA on seemingly arbitrary targets, including a small solar energy company in England, a Japanese dance instructor, and a laminate flooring firm based in Wales.

Michael Smith, an advisor to the US Congress and co-founder of national security firm Kronos Advisory, believes the increase in frequency of attacks carried out by ISIS Hackers signals an increase in the group’s cyber capabilities. Despite the relatively small size of recent targets, Smith also claims they demonstrate ISIS has achieved more sophisticated capabilities to damage its enemies’ interests than Al-Qaeda.

“I expect these activities will become more common,” Smith tells Newsweek. “Plus, we can reasonably expect to see their hackers’ focus widen from breaking into government systems to collect information about military, intelligence, diplomatic and law enforcement officials to doing more dynamic things like attacking critical infrastructure systems.”
Newsweek: http://bit.ly/1RDfAMc

 

« UK Government Goes Ahead With Revised Surveillance Bill
Pentagon Starts Aggressive Cyberwar Against ISIS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Centrify

Centrify

Centrify’s Next-Gen Access is an identity & access management solution that uniquely converges Identity-as-a-Service, enterprise mobility management and privileged access management.

Avanan

Avanan

Avanan is The Cloud Security Platform. Protect all your SaaS applications using tools from over 60 industry-leading vendors in just one click.

Cybertekpro

Cybertekpro

Cybertekpro is a specialist insurance broker providing Cyber Liability insurance and cyber risk assessment services.

Vaulto Technologies

Vaulto Technologies

Vaulto protects critical business processes that are conducted via the cellular network.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Vintegris

Vintegris

Vintegris are a Certification Authority and manufacturer of innovative systems and applications for the full cycle of digital identity.

Sistem Integra (SISB)

Sistem Integra (SISB)

SISB provide IT Security Infrastructure & Development, Mechanical & Electrical Services, Fire Safety & Detection Services, Facilities Management & Application Development.

HorizonIQ

HorizonIQ

HorizonIQ (formerly Internap Corp / INAP) maximizes efficiency and innovation with flexible infrastructure solutions.

Penningtons Manches Cooper

Penningtons Manches Cooper

Penningtons Manches Cooper is a leading UK law firm providing high quality legal advice in areas including Data Protection, Cyber Security and Cyber Crime.

ThreatSwitch

ThreatSwitch

ThreatSwitch a software platform for cleared federal contractors to get and stay compliant with NISPOM and Conforming Change 2.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Quantum Xchange

Quantum Xchange

As the provider of unbreakable quantum-safe encryption, Quantum Xchange gives commercial enterprises and government agencies the ultimate defense to keep high-value data safe.

Techfusion

Techfusion

Techfusion is a cyber security research and consulting firm focusing on digital forensics and data recovery.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Seers

Seers

Seers is the world’s leading privacy & consent management platform for companies worldwide. Trusted by over 50,000+ businesses.