ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

In a video released through ISIS propaganda channels on Twitter and the encrypted messaging app Telegram, the Caliphate Cyber Army (CCA) announced the formation of a new hacking organisation called the Ghost Caliphate.

“We pledge allegiance to the khalifa Abu Baker,” text in the video states. “To listen and obey in hardship and ease, and we will not oppose the caliphate unless we see clear kuffur and deviation, and judging it from the shariah. We make Allah our guide and witness to this.”

AnonGhost has previously been engaged in cyber attacks against Israeli websites, leading an “electronic Holocaust” campaign against Israel for the past two years on the country’s annual Holocaust remembrance day.
A spokesperson for the Palestine Liberation Organisation (PLO) has condemned the move by AnonGhost to pledge allegiance to the “thugs, murderers and criminals of the so-called Daesh”.

“The Palestinian cause embraces universal values of freedom and justice,” Xavier Abu Eid tells Newsweek. “Daesh terrorists have even burnt Palestinian flags. Nobody could support Daesh and the just cause for Palestine’s freedom and independence at the same time.”

Despite the similarities in name, the hacktivist collective Anonymous has distanced itself from AnonGhost in recent years. Following the terror attacks against the French magazine Charlie Hebdo in January 2015, AnonGhost hackers described the satirical publication as “Charlie Pedo” and declared a digital jihad against France.

“I’m not Charlie Pedo, I’m a Muslim and I won’t allow anyone to attack my prophet Mohammed,” AnonGhost said in a statement at the time. “Your freedom of speech [meant] it was only a matter of time before someone was going to display their freedom against you.”

Paraphrasing the Anonymous slogan “We are Legion, we do not forgive, we do not forget, expect us,” Ghost Caliphate states in its video: “We are Muslim, We are many. Beloved Tawheed, Defenced Islam, Rules is Shareea“.

The video shows images of New York and Tel Aviv, interspersed with lines of computer code and phrases like “virus attack” and “global power”. Video footage of wounded infants and small children is also shown.

The video’s narrator states: “Oh Jews, oh crusaders, if you want to protect your blood, increase your wealth, and live in safety from our swords, then there are only two choices before you with no third option. Either you submit yourselves to Allah alone, without partner, and believe in Him as your Lord and God... or you pay us the jizyah with willing submission and feel yourselves subdued.”

Last month, ISIS supporters launched a magazine designed to instruct and inform would-be jihadists on how to take part in a “cyberwar” against the West. Despite this, the cyber threat posed by ISIS is thought, by experts, to be limited, especially since the death of prominent IS hacker Abu Hussain Britani.

“After the US drone strike against Junaid Hussain [Abu Hussain Britani], the cyber caliphate’s effectiveness has declined dramatically and they currently pose little threat to Western society in terms of data breaches, however that is subject to change at any time,” an online spokesperson for the independent counter terrorism network Ghost Security Group, tells Newsweek.

“The Islamic State is recruiting heavily, which opens the possibilities for them to find skilled technical individuals to carry out cyber attacks but currently we have not encountered any which we would deem as a severe threat.”

LinkedIn Pulse: http://bit.ly/1UlGx7w

« When ISIS Turns to Cyber Warfare
Organisations Have A False Sense of Data Security (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Micro Systemation AB (MSAB)

Micro Systemation AB (MSAB)

MSAB is a leader in the provision of forensically secure tools for the extraction and analysis of data from mobile devices.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

CryptoTec

CryptoTec

CryptoTec is a provider of security concepts and encryption solutions for secure communication between decentralized computerized systems.

ECOLUX

ECOLUX

ECOLUX is a professional IoT security service company committed to developing world-leading “IoT Lifecycle Security” technologies and products.

Pinpoint Search Group

Pinpoint Search Group

Pinpoint Search Group's recruiters specialize in Information Management, Cyber Security, Cloud and Robotic Process Automation (RPA).

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

SOC Experts

SOC Experts

SOC Experts is a pioneer (we started SOC training well before people realized how big the domain was going to be) and the only institution to provide end-to-end training on Security Operations Centers

Thistle Technologies

Thistle Technologies

Thistle Technologies is building tools that help connected device manufacturers build security resiliency into devices.

Airtel Secure

Airtel Secure

Airtel Secure’s multi-layered, full service cybersecurity offerings are designed to safeguard enterprises against threats of various kinds and origins.

Descope

Descope

Descope is a service that helps every developer build secure, frictionless authentication and user journeys for any application.

Exodata

Exodata

Exodata is a French digital services company specializing in the outsourcing of IT Systems and solutions.

Oasis Security

Oasis Security

Oasis is the market leading platform for non-human identity management. Our mission is to fortify cybersecurity defenses by enabling enterprises to efficiently secure non-human identities.

Omnex

Omnex

Omnex provides consulting and training services in Quality, Environmental, and Health and Safety standards-based management systems including Automotive Cybersecurity.

Cyro Cyber

Cyro Cyber

Cyro Cyber is a collective of some of the UK’s most experienced and savvy cybersecurity, information assurance, data protection, IT governance and compliance experts.