ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

In a video released through ISIS propaganda channels on Twitter and the encrypted messaging app Telegram, the Caliphate Cyber Army (CCA) announced the formation of a new hacking organisation called the Ghost Caliphate.

“We pledge allegiance to the khalifa Abu Baker,” text in the video states. “To listen and obey in hardship and ease, and we will not oppose the caliphate unless we see clear kuffur and deviation, and judging it from the shariah. We make Allah our guide and witness to this.”

AnonGhost has previously been engaged in cyber attacks against Israeli websites, leading an “electronic Holocaust” campaign against Israel for the past two years on the country’s annual Holocaust remembrance day.
A spokesperson for the Palestine Liberation Organisation (PLO) has condemned the move by AnonGhost to pledge allegiance to the “thugs, murderers and criminals of the so-called Daesh”.

“The Palestinian cause embraces universal values of freedom and justice,” Xavier Abu Eid tells Newsweek. “Daesh terrorists have even burnt Palestinian flags. Nobody could support Daesh and the just cause for Palestine’s freedom and independence at the same time.”

Despite the similarities in name, the hacktivist collective Anonymous has distanced itself from AnonGhost in recent years. Following the terror attacks against the French magazine Charlie Hebdo in January 2015, AnonGhost hackers described the satirical publication as “Charlie Pedo” and declared a digital jihad against France.

“I’m not Charlie Pedo, I’m a Muslim and I won’t allow anyone to attack my prophet Mohammed,” AnonGhost said in a statement at the time. “Your freedom of speech [meant] it was only a matter of time before someone was going to display their freedom against you.”

Paraphrasing the Anonymous slogan “We are Legion, we do not forgive, we do not forget, expect us,” Ghost Caliphate states in its video: “We are Muslim, We are many. Beloved Tawheed, Defenced Islam, Rules is Shareea“.

The video shows images of New York and Tel Aviv, interspersed with lines of computer code and phrases like “virus attack” and “global power”. Video footage of wounded infants and small children is also shown.

The video’s narrator states: “Oh Jews, oh crusaders, if you want to protect your blood, increase your wealth, and live in safety from our swords, then there are only two choices before you with no third option. Either you submit yourselves to Allah alone, without partner, and believe in Him as your Lord and God... or you pay us the jizyah with willing submission and feel yourselves subdued.”

Last month, ISIS supporters launched a magazine designed to instruct and inform would-be jihadists on how to take part in a “cyberwar” against the West. Despite this, the cyber threat posed by ISIS is thought, by experts, to be limited, especially since the death of prominent IS hacker Abu Hussain Britani.

“After the US drone strike against Junaid Hussain [Abu Hussain Britani], the cyber caliphate’s effectiveness has declined dramatically and they currently pose little threat to Western society in terms of data breaches, however that is subject to change at any time,” an online spokesperson for the independent counter terrorism network Ghost Security Group, tells Newsweek.

“The Islamic State is recruiting heavily, which opens the possibilities for them to find skilled technical individuals to carry out cyber attacks but currently we have not encountered any which we would deem as a severe threat.”

LinkedIn Pulse: http://bit.ly/1UlGx7w

« When ISIS Turns to Cyber Warfare
Organisations Have A False Sense of Data Security (£) »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LogRhythm

LogRhythm

LogRhythm's security platform unifies SIEM, log management, network and endpoint monitoring, user behaviour analytics, security automation and advanced security analytics.

AvePoint

AvePoint

AvePoint is an established leader in enterprise-class data management, governance, and compliance software solutions.

QMS International

QMS International

QMS is one of the leading ISO certification bodies in the UK and serves clients worldwide.

Romanian Association for Information Security Assurance (RAISA)

Romanian Association for Information Security Assurance (RAISA)

RAISA promotes and supports information security activities and creates a community for the exchange of knowledge between specialists, academic and corporate environment in Romania.

CSIRT-IE

CSIRT-IE

CSIRT-IE is the body within the NCSC that provides assistance to constituents in responding to cyber security incidents at a national level for Ireland.

RATEL (SRB-CERT)

RATEL (SRB-CERT)

RATEL has been appointed as the National Center for the Prevention of Security Risks in ICT systems of the Republic of Serbia (SRB-CERT).

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS)

Ukrainian Special Systems (USS) is a state-owned commercial enterprise providing confidential communication, trust services and services in the field of information protection.

ShardSecure

ShardSecure

ShardSecure Microshard technology eliminates data sensitivity, providing security, privacy and compliance beyond encryption.

Ostendio

Ostendio

Ostendio is a cybersecurity and information management solutions provider that develops affordable compliance solutions for digital health companies and other regulated entities.

Input Output (IOHK)

Input Output (IOHK)

IOHK is one of the world's pre-eminent blockchain infrastructure research and engineering companies.

Coviant Software

Coviant Software

Coviant Software delivers secure managed file transfer (MFT) software that integrates smoothly and easily with business processes.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Commission Nationale de l'Informatique et des Libertés (CNIL)

Commission Nationale de l'Informatique et des Libertés (CNIL)

The mission of CNIL is to protect personal data, support innovation, and preserve individual liberties.

Summit 7 (S7)

Summit 7 (S7)

Summit 7 is a national leader in cybersecurity, compliance, and managed services for the Aerospace and Defense industry and corporate enterprises.

Triovega

Triovega

Triovega are a leading provider for production security and efficiency. Our solutions enhance OT security, and reduce production downtime.

Texas Cyber Solutions

Texas Cyber Solutions

Texas Cyber Solutions are elite cybersecurity advisors based in Houston, Texas providing network security solutions, penetration testing, and more.