ISIS Warns Of Imminent Cyber Attacks On The US

An online group that supports the Islamic State has released a new video warning of an upcoming cyber war. The group has named the United States as its first target, according to analysts at JihadoScope.

The group, which was identified by JihadoScope as “Electronic Ghosts of the Caliphate,” claimed to be the “hackers of the Islamic State” and threatened cyber-attacks against the enemies of ISIS, starting with an attack against the US planned for this month. “We will face you with a massive cyber war,” the group, which calls itself “Caliphate Cyber Ghosts.” warned in the video, and described the planned cyber-attacks as "Black days you will remember".

The video first surfaced online midday Monday 4th December and has been spread online via Twitter, Vimeo, Facebook and other platforms. "Electronic Ghosts of the Caliphate" is one of more than one dozen hacking groups that merged in 2016 under the banner of the United Cyber Caliphate, which had been dormant for months before resurfacing in recent weeks, according to JihadoScope. "The group is threatening to 'penetrate' websites including government and military, while identifying America as their first target," Gluck told IBT. The analyst explained that it is not typical for groups to name the date of their attack. "It’s possible that naming a date is a response to the so-called Islamic State ‘hackers’ who struck a couple of weeks back and predicted the Friday November 17th as their day of activity," Gluck said. "Perhaps putting forward a date is an attempt to project a great threat."

The group is just the latest pro-ISIS group to promise a return to cyber warfare, where ISIS has been somewhat stifled since crackdowns on the terrorist organization’s activity were implemented by major tech companies and social media sites.
According to a post made in November by JihadoScope, the hacking collected identified as UCC announced that it would resume its operations, carrying out hacks and cyber-attacks against a number of targets, including Facebook and Twitter accounts and websites.

The group threatened to hack websites and turn them into tools of pro-ISIS media and spread their message using hacked social media accounts. It highlighted this effort by showing a number of Twitter accounts the group successfully compromised, a task that can be done by buying stolen credentials off the dark web and does not necessarily require any technical hacking skills.

UCC has a history of executing attention-grabbing online campaigns. The group netted headlines in 2016 and earlier this year after it published “kill lists” that contained the names and addresses of thousands of individuals in the US and United Kingdom.

Despite the shocking behavior that is successful in generating fear, the group has not received much praise for its actual hacking capabilities. Kyle Wilhoit, a senior security researcher at DomainTools, described the coding skills of UCC as “garbage” earlier this year at security conference DerbyCon in Kentucky. “As it stands ISIS are not hugely operationally capable online,” he said.

The increased activity online from ISIS comes just weeks after a group of Muslim hackers claimed to have taken down the terrorist group’s news websites, including Amaq. The group also set up fake websites designed to look like the news sites in order to spread disinformation through ISIS channels. 

While the group of Muslim hackers also claimed it would release ISIS communications intercepted from messaging apps, it did not follow through on the threat.

IB Times

You Might Also Read:

Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

Terrorist Activities On Social Media:

Facebook Algotithms Will Identify Terrorists: 

 

« The GDPR Advisory Board Offers Expert Advice
German Spies Warn Of Chinese Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Leonardo

Leonardo

Leonardo (formerly Finmeccanica) is a global high-tech company in Aerospace, Defence, Security & Information Systems including Cybersecurity & ICT solutions.

Hyve

Hyve

Hyve provide a wide range of managed web hosting services including private, hybrid and public VMware cloud hosting.

Bechtel

Bechtel

Bechtel’s Industrial Control Systems Cyber Security Laboratory focuses on protecting large-scale industrial and infrastructure systems that support critical infrastructure.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Cyber Craft

Cyber Craft

CyberCraft is an innovative and dynamic software development, outsourcing and consulting company. Services offered include penetration testing.

IAmI Authentications

IAmI Authentications

IAmI is a first in Tokenization Cloud-based IAM Security Services, delivering the most advanced form of Two-Factor Authentication.

Cybersecurity Defense Initiative (CDI) - University of Arkansas

Cybersecurity Defense Initiative (CDI) - University of Arkansas

The Cybersecurity Defense Initiative is a national cybersecurity training program, developed for technical personnel and managers who monitor and protect our nation's critical cyber infrastructures.

AnChain.AI

AnChain.AI

AnChain.AI's analytics platform proactively protects crypto assets by providing proprietary artificial intelligence, knowledge graphs, and threat intelligence on blockchain transactions.

Estio Training

Estio Training

Estio Training is a specialist digital and IT apprenticeships provider, dedicated to introducing new skills and developing existing talent in businesses across the UK.

Celera Networks

Celera Networks

Celera Networks is a managed services provider specializing in cybersecurity, cloud and managed IT services.

Securance Consulting

Securance Consulting

Since 2002, Securance has empowered enterprises to assume proactive security, compliance, and risk management strategies.

Keepit

Keepit

Keepit offer all-inclusive, secure, and reliable backup and recovery services for your data.

Oleria Security

Oleria Security

Oleria is the only adaptive and autonomous security solution that helps organizations accelerate at the pace of change, trusting that data is protected.

Post-Quantum Cryptography Alliance (PQCA)

Post-Quantum Cryptography Alliance (PQCA)

The alliance seeks to address cryptographic security challenges posed by quantum computing by producing high-assurance software implementations of standardized algorithms.

UltraViolet Cyber

UltraViolet Cyber

UltraViolet is an industry leading tech-enabled managed security services company.

WIIT Group

WIIT Group

WIIT Group are focused on a single goal: securing our clients’ critical processes and enabling them for digital transformation.