ISIS Warns Of Imminent Cyber Attacks On The US

An online group that supports the Islamic State has released a new video warning of an upcoming cyber war. The group has named the United States as its first target, according to analysts at JihadoScope.

The group, which was identified by JihadoScope as “Electronic Ghosts of the Caliphate,” claimed to be the “hackers of the Islamic State” and threatened cyber-attacks against the enemies of ISIS, starting with an attack against the US planned for this month. “We will face you with a massive cyber war,” the group, which calls itself “Caliphate Cyber Ghosts.” warned in the video, and described the planned cyber-attacks as "Black days you will remember".

The video first surfaced online midday Monday 4th December and has been spread online via Twitter, Vimeo, Facebook and other platforms. "Electronic Ghosts of the Caliphate" is one of more than one dozen hacking groups that merged in 2016 under the banner of the United Cyber Caliphate, which had been dormant for months before resurfacing in recent weeks, according to JihadoScope. "The group is threatening to 'penetrate' websites including government and military, while identifying America as their first target," Gluck told IBT. The analyst explained that it is not typical for groups to name the date of their attack. "It’s possible that naming a date is a response to the so-called Islamic State ‘hackers’ who struck a couple of weeks back and predicted the Friday November 17th as their day of activity," Gluck said. "Perhaps putting forward a date is an attempt to project a great threat."

The group is just the latest pro-ISIS group to promise a return to cyber warfare, where ISIS has been somewhat stifled since crackdowns on the terrorist organization’s activity were implemented by major tech companies and social media sites.
According to a post made in November by JihadoScope, the hacking collected identified as UCC announced that it would resume its operations, carrying out hacks and cyber-attacks against a number of targets, including Facebook and Twitter accounts and websites.

The group threatened to hack websites and turn them into tools of pro-ISIS media and spread their message using hacked social media accounts. It highlighted this effort by showing a number of Twitter accounts the group successfully compromised, a task that can be done by buying stolen credentials off the dark web and does not necessarily require any technical hacking skills.

UCC has a history of executing attention-grabbing online campaigns. The group netted headlines in 2016 and earlier this year after it published “kill lists” that contained the names and addresses of thousands of individuals in the US and United Kingdom.

Despite the shocking behavior that is successful in generating fear, the group has not received much praise for its actual hacking capabilities. Kyle Wilhoit, a senior security researcher at DomainTools, described the coding skills of UCC as “garbage” earlier this year at security conference DerbyCon in Kentucky. “As it stands ISIS are not hugely operationally capable online,” he said.

The increased activity online from ISIS comes just weeks after a group of Muslim hackers claimed to have taken down the terrorist group’s news websites, including Amaq. The group also set up fake websites designed to look like the news sites in order to spread disinformation through ISIS channels. 

While the group of Muslim hackers also claimed it would release ISIS communications intercepted from messaging apps, it did not follow through on the threat.

IB Times

You Might Also Read:

Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

Terrorist Activities On Social Media:

Facebook Algotithms Will Identify Terrorists: 

 

« The GDPR Advisory Board Offers Expert Advice
German Spies Warn Of Chinese Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

C2B2 Consulting

C2B2 Consulting

C2B2 are experts in middleware support and consultancy. We specialise in ensuring scalability, performance and security of large scale systems.

Barracuda

Barracuda

Barracuda provides a comprehensive cybersecurity platform to protect organizations from all major attack vectors that are present in today’s complex threats.

Australian Information Security Association (AISA)

Australian Information Security Association (AISA)

AISA champions the development of a robust information security sector by building professional capacity and advancing the cyber security of the public, business and governments in Australia.

Seagate Technology

Seagate Technology

Seagate data storage systems are purpose-built for enterprise and data centre performance, scalability, reliability and security.

CERT.LV

CERT.LV

CERT.LV is the national Computer Emergency Response Team for Latvia.

Cyber Security & Information Systems Information Analysis Center (CSIAC)

Cyber Security & Information Systems Information Analysis Center (CSIAC)

CSIAC is chartered to leverage best practices and expertise from government, industry, and academia on cyber security and information technology.

Entrust

Entrust

Entrust is a global leader in digital security, identities, payments, and data protection.

Cryptosense

Cryptosense

Cryptosense provides the first application security software dedicated to the detection and remediation of crypto vulnerabilities.

Aergo

Aergo

Aergo offers an easier and more proven way to adopt blockchain and transform your business while building on your existing IT and cloud assets.

Dcode

Dcode

Dcode connects the tech industry and government to drive commercial innovation in the federal market.

RegScale

RegScale

RegScale helps organizations comply in real-time with multiple compliance requirements (NIST, CMMC, ISO, SOX, etc), scalable to meet the needs of the entire enterprise.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Cloudflare

Cloudflare

Cloudflare is a global network designed to make everything you connect to the Internet secure, private, fast, and reliable.

First Focus

First Focus

First Focus is a managed service provider for medium-sized organisations.

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Couno

Couno

Couno is a trusted provider of IT support services throughout the UK and Europe.