Islamic State Cyber Attacks

 

A very real and dangerous national security cyber threat that results from the combination of terrorism and hacking.

A US federal district court in the Eastern District of Virginia has sentenced Ardit Ferizi, a citizen of Kosovo and resident of Malaysia, to 20 years in prison for providing material support to Islamic State and accessing a protected computer without authorization and obtaining information in order to provide material support to IS.

"This case represents the first time we have seen the very real and dangerous national security cyber threat that results from the combination of terrorism and hacking,” said Assistant Attorney General John Carlin. “This was a wake-up call not only to those of us in law enforcement, but also to those in private industry.”

According to the government’s sentencing memo and press release, the 20-year-old hacker, who was previously arrested several times for cyber-crimes in Kosovo, is the first person to be effectively prosecuted in the US for a combination of terrorism and hacking. 

The government alleges that the defendant indefinitely put the lives of 1,300 US military members and government employees at risk when he passed their personal identifying information to ISIL as part of the terrorist group’s plan to “crowdsource” terrorism.

From April 2015, Ferizi began supporting ISIL by administering a website that hosted ISIL videos and Dabiq, ISIL’s English language magazine. The complaint and supporting affidavit allege that Ferizi then graduated to providing ISIL with the personally identifiable information (PII) of individuals in “kuffar” countries that were attacking the United States. 

Several months later, he took a leap forward when he hacked into the server of an Illinois-based company that sold goods to customers in the United States and abroad. Many of those customers were U.S. military and other government personnel, easily identified by their “.gov” or “.mil” email addresses in the system.

According to the statement of facts accompanying the plea agreement, Ferizi subsequently sent the 27 pages of PII to the now-deceased Junaid Hussain, who released the information via Twitter on August 11th under the name “Islamic State Hacking Division.” ISIL encouraged its supporters to attack the named individuals and warned that "we are extracting confidential data and passing on your personal information to the soldier of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!" The "kill list" included residents of the Eastern District of Virginia.

Aside from being one of the first cyberterrorism cases in the country, this case is interesting in that it highlights the extensive cooperation between the government and industry in the aftermath of the hack. 

Less than two days after the list was published, the victim company contacted the FBI to report a threatening message it had received, Ferizi, unidentified at the time, had sent a threatening email after the company deleted the malware he had placed on the server in order to gain access to their systems. The company quickly provided the FBI with consent to review all information related to their website, which eventually led to the identification of the defendant, via a Malaysia-based IP address.

Presenting a contrast to the cumbersome extradition process in the Irfan Demirtas case, Ferizi had his initial appearance in the US within six months. In September, Malaysian authorities detained Ferizi as he was attempting to leave the country. Like Demirtas, who was charged in the US after he was already under the control of a foreign service, Ferizi was charged via a sealed complaint on October 6th. On October 12th, Malaysian authorities provisionally arrested him at the request of the United States; the case was unsealed three days later, and, on January 22, 2016, Ferizi was extradited to the United States.

In a separate case arising out of the Northern District of Illinois, Hasan R. Edmonds and Jonas M. Edmonds were sentenced to 30 and 21 years, respectively, for conspiring to provide material support to ISIL, according to the Justice Department’s press release.

The two cousins were arrested in March 2015, after planning to carry out an armed attack at the US Army National Guard base in Joliet, Illinois, about 45 minutes southwest of Chicago. Like Bailor Jalloh and Michael Teausant, Hasan Edmonds was a member of the Army National Guard. According to the complaint, Hasan also planned to travel to the Middle East to fight for ISIL.

According to court documents, on Aug. 11, 2015, in the name of the Islamic State Hacking Division (ISHD), Hussain posted a tweet that contained a document with the PII of the approximately 1,300 US military and other government personnel that Ferizi had taken from the victim company and provided to Hussain. 

The document stated, in part, that “we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!” Ferizi admitted that he provided the PII to ISIL with the understanding that ISIL would use the PII to “hit them hard.”


LawfareBlog:           Justice.gov:

 

 

« IoT 2.0: The Internet of Things-to-Things
Strategies For A Culture of Cyber-Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

SSL247

SSL247

SSL247 is Europe's leading Web Security Consultancy Firm. We enjoy long-standing partnerships with Certificate Authorities including Symantec, GlobalSign, Entrust Datacard, Comodo, Thales and Qualys.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

Johnson Controls International

Johnson Controls International

Johnson Controls is a global diversified technology company with a focus on smart cities, energy, infrastructure and transportation including the security of automation and control systems.

Romanian Accreditation Association (RENAR)

Romanian Accreditation Association (RENAR)

RENAR is the national accreditation body for Romania. The directory of members provides details of organisations offering certification services for ISO 27001.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Marlabs

Marlabs

Marlabs is a Digital Technology Solutions company that helps companies adopt digital transformation using a comprehensive framework including Digital Automation, Enterprise Analytics and Security.

Wayra

Wayra

Wayra connects Telefónica and technological disruptors around the world. As their preferred strategic partner, we scale them up to accelerate their business and ours.

IT Acceleration

IT Acceleration

IT Acceleration is a full-service IT management and support, IT compliance and Digital Forensics company.

Advantex Network Solutions

Advantex Network Solutions

Advantex Network Solutions are a leading provider in Mitel, IT Solutions, Networking, and iP surveillance.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Seccuri

Seccuri

Seccuri is a unique global cybersecurity talent tech platform. Use our specialized AI algorithm to grow and improve the cybersecurity workforce.

Wadilona Cyber Securities

Wadilona Cyber Securities

Wadilona Cyber Securities' sole aim is to bring and secure Information and Communications Technology (ICT) to and work for humans in its simplest terms.

Tarlogic

Tarlogic

Tarlogic works to protect and defend your security with the highest quality technical team with next generation solutions to achieve the best protection.

Harbottle & Lewis

Harbottle & Lewis

Harbottle & Lewis is a leading UK-based law firm focused on the Private Client and Technology, Media and Entertainment sectors.

COPA-DATA

COPA-DATA

COPA-DATA is the only independent software manufacturer to combine in-depth experience in automation with new possibilities of digital transformation – reliable, future-proof and operating worldwide.

Nagomi Security

Nagomi Security

Nagomi is changing the way security teams balance risk and defense, empowering customers to focus on what matters now.