ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

In a video released through ISIS propaganda channels on Twitter and the encrypted messaging app Telegram, the Caliphate Cyber Army (CCA) announced the formation of a new hacking organisation called the Ghost Caliphate.

“We pledge allegiance to the khalifa Abu Baker,” text in the video states. “To listen and obey in hardship and ease, and we will not oppose the caliphate unless we see clear kuffur and deviation, and judging it from the shariah. We make Allah our guide and witness to this.”

AnonGhost has previously been engaged in cyber attacks against Israeli websites, leading an “electronic Holocaust” campaign against Israel for the past two years on the country’s annual Holocaust remembrance day.
A spokesperson for the Palestine Liberation Organisation (PLO) has condemned the move by AnonGhost to pledge allegiance to the “thugs, murderers and criminals of the so-called Daesh”.

“The Palestinian cause embraces universal values of freedom and justice,” Xavier Abu Eid tells Newsweek. “Daesh terrorists have even burnt Palestinian flags. Nobody could support Daesh and the just cause for Palestine’s freedom and independence at the same time.”

Despite the similarities in name, the hacktivist collective Anonymous has distanced itself from AnonGhost in recent years. Following the terror attacks against the French magazine Charlie Hebdo in January 2015, AnonGhost hackers described the satirical publication as “Charlie Pedo” and declared a digital jihad against France.

“I’m not Charlie Pedo, I’m a Muslim and I won’t allow anyone to attack my prophet Mohammed,” AnonGhost said in a statement at the time. “Your freedom of speech [meant] it was only a matter of time before someone was going to display their freedom against you.”

Paraphrasing the Anonymous slogan “We are Legion, we do not forgive, we do not forget, expect us,” Ghost Caliphate states in its video: “We are Muslim, We are many. Beloved Tawheed, Defenced Islam, Rules is Shareea“.

The video shows images of New York and Tel Aviv, interspersed with lines of computer code and phrases like “virus attack” and “global power”. Video footage of wounded infants and small children is also shown.

The video’s narrator states: “Oh Jews, oh crusaders, if you want to protect your blood, increase your wealth, and live in safety from our swords, then there are only two choices before you with no third option. Either you submit yourselves to Allah alone, without partner, and believe in Him as your Lord and God... or you pay us the jizyah with willing submission and feel yourselves subdued.”

Last month, ISIS supporters launched a magazine designed to instruct and inform would-be jihadists on how to take part in a “cyberwar” against the West. Despite this, the cyber threat posed by ISIS is thought, by experts, to be limited, especially since the death of prominent IS hacker Abu Hussain Britani.

“After the US drone strike against Junaid Hussain [Abu Hussain Britani], the cyber caliphate’s effectiveness has declined dramatically and they currently pose little threat to Western society in terms of data breaches, however that is subject to change at any time,” an online spokesperson for the independent counter terrorism network Ghost Security Group, tells Newsweek.

“The Islamic State is recruiting heavily, which opens the possibilities for them to find skilled technical individuals to carry out cyber attacks but currently we have not encountered any which we would deem as a severe threat.”

LinkedIn Pulse: http://bit.ly/1UlGx7w

« When ISIS Turns to Cyber Warfare
Organisations Have A False Sense of Data Security (£) »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Veeam

Veeam

Veeam is the leader in intelligent data management for the Hyper-Available Enterprise.

Wilson Sonsini Goodrich & Rosati (WSGR)

Wilson Sonsini Goodrich & Rosati (WSGR)

WSGR is the premier provider of legal services to technology, life sciences, and growth enterprises worldwide. Practice areas include cybersecurity and data protection.

CANVAS Consortium

CANVAS Consortium

The CANVAS Consortium aims to unify technology developers with legal and ethical scholar and social scientists to approach the challenges of cybersecurity.

Dark Cubed

Dark Cubed

Dark Cubed is an easy-to-use cyber security software as a service (SaaS) platform that deploys instantly and delivers enterprise-grade threat identification and protection at a fraction of the cost.

Expanse

Expanse

Expanse SaaS-delivered products plus service expertise reduce your internet edge risk to prevent breaches and successful attacks.

Cyfirma

Cyfirma

CYFIRMA offers Cyber threat visibility and intelligence suite and services aimed at keeping your organization’s cybersecurity posture up-to-date.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

Onevinn

Onevinn

Onevinn's goal is to create a transparent, cost-effective security that is noticed as little as possible by the users. We simply call it "intelligent security."

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

CyberSanctus

CyberSanctus

CyberSanctus provide clients with a variety of pentest plans from the entry level starter plan, which is tailored for personal websites, to enterprise level pentests, tailored for large scale business

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Sasken Technologies

Sasken Technologies

Sasken’s Cybersecurity Services enables enterprises to develop, maintain, and take digital products to the market with security postures that empower operational excellence.

PlanNet 21 Communications

PlanNet 21 Communications

PlanNet 21 Communications is Ireland most specialised technology solution provider.

Cassini

Cassini

Cassini Cyber Threat Intelligence (CTI) helps protect your organisation from cyber attacks using threat intelligence from trusted New Zealand agencies.