ISIS Warns Of Imminent Cyber Attacks On The US

An online group that supports the Islamic State has released a new video warning of an upcoming cyber war. The group has named the United States as its first target, according to analysts at JihadoScope.

The group, which was identified by JihadoScope as “Electronic Ghosts of the Caliphate,” claimed to be the “hackers of the Islamic State” and threatened cyber-attacks against the enemies of ISIS, starting with an attack against the US planned for this month. “We will face you with a massive cyber war,” the group, which calls itself “Caliphate Cyber Ghosts.” warned in the video, and described the planned cyber-attacks as "Black days you will remember".

The video first surfaced online midday Monday 4th December and has been spread online via Twitter, Vimeo, Facebook and other platforms. "Electronic Ghosts of the Caliphate" is one of more than one dozen hacking groups that merged in 2016 under the banner of the United Cyber Caliphate, which had been dormant for months before resurfacing in recent weeks, according to JihadoScope. "The group is threatening to 'penetrate' websites including government and military, while identifying America as their first target," Gluck told IBT. The analyst explained that it is not typical for groups to name the date of their attack. "It’s possible that naming a date is a response to the so-called Islamic State ‘hackers’ who struck a couple of weeks back and predicted the Friday November 17th as their day of activity," Gluck said. "Perhaps putting forward a date is an attempt to project a great threat."

The group is just the latest pro-ISIS group to promise a return to cyber warfare, where ISIS has been somewhat stifled since crackdowns on the terrorist organization’s activity were implemented by major tech companies and social media sites.
According to a post made in November by JihadoScope, the hacking collected identified as UCC announced that it would resume its operations, carrying out hacks and cyber-attacks against a number of targets, including Facebook and Twitter accounts and websites.

The group threatened to hack websites and turn them into tools of pro-ISIS media and spread their message using hacked social media accounts. It highlighted this effort by showing a number of Twitter accounts the group successfully compromised, a task that can be done by buying stolen credentials off the dark web and does not necessarily require any technical hacking skills.

UCC has a history of executing attention-grabbing online campaigns. The group netted headlines in 2016 and earlier this year after it published “kill lists” that contained the names and addresses of thousands of individuals in the US and United Kingdom.

Despite the shocking behavior that is successful in generating fear, the group has not received much praise for its actual hacking capabilities. Kyle Wilhoit, a senior security researcher at DomainTools, described the coding skills of UCC as “garbage” earlier this year at security conference DerbyCon in Kentucky. “As it stands ISIS are not hugely operationally capable online,” he said.

The increased activity online from ISIS comes just weeks after a group of Muslim hackers claimed to have taken down the terrorist group’s news websites, including Amaq. The group also set up fake websites designed to look like the news sites in order to spread disinformation through ISIS channels. 

While the group of Muslim hackers also claimed it would release ISIS communications intercepted from messaging apps, it did not follow through on the threat.

IB Times

You Might Also Read:

Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

Terrorist Activities On Social Media:

Facebook Algotithms Will Identify Terrorists: 

 

« The GDPR Advisory Board Offers Expert Advice
German Spies Warn Of Chinese Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

RCMP Cybercrime Strategy

RCMP Cybercrime Strategy

The RCMP Cybercrime Strategy sets out in an Operational Framework and Action Plan to combat cybercrime.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

National Association of State Chief Information Officers (NASCIO)

National Association of State Chief Information Officers (NASCIO)

NASCIO's Cybersecurity Committee focuses helps state CIOs to formulate high-level security and data protection policies and technical controls.

Parsons

Parsons

Parsons has developed a converged security offering that combines cybersecurity, integrated network solutions, and critical infrastructure protection.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

InstaSafe Technologies

InstaSafe Technologies

InstaSafe®, a Software Defined Perimeter based (SDP) one-stop Secure Access Solution for On-Premise and Cloud Applications.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Elliptic

Elliptic

Elliptic solve the crucial problem of identity in cryptocurrencies, with the sole purpose of combating suspicious and criminal activity.

HCL Technologies

HCL Technologies

HCL offer an integrated portfolio of products, solutions and services built around Digital, IoT, Cloud, Automation, Cybersecurity, Analytics, Infrastructure Management and Engineering Services.

Griffeshield

Griffeshield

Griffeshield is a company specialised in new information technologies used to protect Intellectual Property.

NuID

NuID

NuID is a pioneer in trustless authentication and decentralized digital identity.

Quantinuum

Quantinuum

Quantinuum is the combination of Cambridge Quantum with Honeywell Quantum Solutions, structured to drive the future of quantum computing.

Cubro Network Visibility

Cubro Network Visibility

Cubro network visibility solutions remove network monitoring ‘blind spots’ to provide enhanced visibility and control of all data transiting a company’s network.

SecureData

SecureData

SecureData provide professional data recovery services, digital forensics, data recovery software and FIPS 140-2 Level 3 Validated hardware encrypted drives.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.