ISIS Hack The Wrong Google

Hackers affiliated with the Islamic State militant group (ISIS) who promised to take down Google appear to have mistakenly attacked the wrong target.

The so-called Caliphate Cyber Army (CCA) announced plans on the secure messaging app Telegram to hack Google; however, Google services appear to have been unaffected.

“We promised to hack Google,” stated a message that was posted to a Telegram channel used by the CCA. “Keep the promise Inshallah [God willing], expect us today.”

Instead, the website of Add Google Online was defaced with ISIS imagery and a message stating, “hacked by CCA”. A French-language Islamic State song also played, promising: “We will kill you without pity… for Allah alone we wear suicide belts.” 
 
The site, registered to Indian firm Always Say, offers search engine optimization (SEO) services to local businesses but is not connected with Google.

The attack on Add Google Online follows similar attacks by CCA on seemingly arbitrary targets, including a small solar energy company in England, a Japanese dance instructor, and a laminate flooring firm based in Wales.

Michael Smith, an advisor to the US Congress and co-founder of national security firm Kronos Advisory, believes the increase in frequency of attacks carried out by ISIS Hackers signals an increase in the group’s cyber capabilities. Despite the relatively small size of recent targets, Smith also claims they demonstrate ISIS has achieved more sophisticated capabilities to damage its enemies’ interests than Al-Qaeda.

“I expect these activities will become more common,” Smith tells Newsweek. “Plus, we can reasonably expect to see their hackers’ focus widen from breaking into government systems to collect information about military, intelligence, diplomatic and law enforcement officials to doing more dynamic things like attacking critical infrastructure systems.”
Newsweek: http://bit.ly/1RDfAMc

 

« UK Government Goes Ahead With Revised Surveillance Bill
Pentagon Starts Aggressive Cyberwar Against ISIS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

IntSights

IntSights

IntSights is an intelligence driven security provider offering rapid, accurate cyberthreat intelligence and incident mitigation in real time

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

AllClear ID

AllClear ID

AllClear ID provides products and services that help protect people and their personal information from threats related to identity theft.

Atomicorp

Atomicorp

Atomicorp, the leader in Secure Linux, is a developer of solutions for the protection and support of cloud, virtual, shared, and dedicated web hosting environments.

PRODAFT

PRODAFT

PRODAFT, Proactive Defense Against Future Threats, is a cyber security and cyber intelligence company providing solutions to commercial customers and government institutions.

AFNOR Group

AFNOR Group

AFNOR Group designs and deploys solutions based on voluntary standards around the world and provides services including training, professional and technical information, assessment and certification.

DestructData

DestructData

DestructData is a leading independent provider of End of Life data destruction/security solutions.

Cylera

Cylera

Cylera is a Healthcare IoT cybersecurity and intelligence company built in close partnership with healthcare providers.

NeuVector

NeuVector

NeuVector, the leader in Full Lifecycle Container Security, delivers uncompromising end-to-end security from DevOps vulnerability protection to complete protection in production.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

Yoti

Yoti

Yoti offer a suite of business solutions that span identity verification, age estimation, e-signing and AI anti-spoofing technologies.

Upfront Security

Upfront Security

Upfront Security helps companies with innovative products & services to prevent, recognise and recover from (identity) fraud.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

CyAmast

CyAmast

CyAmast is an IoT Network security and analytics company that is changing the way enterprise and governments detect and protect networks from the pervasive threat of cyber attacks.