Islamic State Cyber Attacks

 

A very real and dangerous national security cyber threat that results from the combination of terrorism and hacking.

A US federal district court in the Eastern District of Virginia has sentenced Ardit Ferizi, a citizen of Kosovo and resident of Malaysia, to 20 years in prison for providing material support to Islamic State and accessing a protected computer without authorization and obtaining information in order to provide material support to IS.

"This case represents the first time we have seen the very real and dangerous national security cyber threat that results from the combination of terrorism and hacking,” said Assistant Attorney General John Carlin. “This was a wake-up call not only to those of us in law enforcement, but also to those in private industry.”

According to the government’s sentencing memo and press release, the 20-year-old hacker, who was previously arrested several times for cyber-crimes in Kosovo, is the first person to be effectively prosecuted in the US for a combination of terrorism and hacking. 

The government alleges that the defendant indefinitely put the lives of 1,300 US military members and government employees at risk when he passed their personal identifying information to ISIL as part of the terrorist group’s plan to “crowdsource” terrorism.

From April 2015, Ferizi began supporting ISIL by administering a website that hosted ISIL videos and Dabiq, ISIL’s English language magazine. The complaint and supporting affidavit allege that Ferizi then graduated to providing ISIL with the personally identifiable information (PII) of individuals in “kuffar” countries that were attacking the United States. 

Several months later, he took a leap forward when he hacked into the server of an Illinois-based company that sold goods to customers in the United States and abroad. Many of those customers were U.S. military and other government personnel, easily identified by their “.gov” or “.mil” email addresses in the system.

According to the statement of facts accompanying the plea agreement, Ferizi subsequently sent the 27 pages of PII to the now-deceased Junaid Hussain, who released the information via Twitter on August 11th under the name “Islamic State Hacking Division.” ISIL encouraged its supporters to attack the named individuals and warned that "we are extracting confidential data and passing on your personal information to the soldier of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!" The "kill list" included residents of the Eastern District of Virginia.

Aside from being one of the first cyberterrorism cases in the country, this case is interesting in that it highlights the extensive cooperation between the government and industry in the aftermath of the hack. 

Less than two days after the list was published, the victim company contacted the FBI to report a threatening message it had received, Ferizi, unidentified at the time, had sent a threatening email after the company deleted the malware he had placed on the server in order to gain access to their systems. The company quickly provided the FBI with consent to review all information related to their website, which eventually led to the identification of the defendant, via a Malaysia-based IP address.

Presenting a contrast to the cumbersome extradition process in the Irfan Demirtas case, Ferizi had his initial appearance in the US within six months. In September, Malaysian authorities detained Ferizi as he was attempting to leave the country. Like Demirtas, who was charged in the US after he was already under the control of a foreign service, Ferizi was charged via a sealed complaint on October 6th. On October 12th, Malaysian authorities provisionally arrested him at the request of the United States; the case was unsealed three days later, and, on January 22, 2016, Ferizi was extradited to the United States.

In a separate case arising out of the Northern District of Illinois, Hasan R. Edmonds and Jonas M. Edmonds were sentenced to 30 and 21 years, respectively, for conspiring to provide material support to ISIL, according to the Justice Department’s press release.

The two cousins were arrested in March 2015, after planning to carry out an armed attack at the US Army National Guard base in Joliet, Illinois, about 45 minutes southwest of Chicago. Like Bailor Jalloh and Michael Teausant, Hasan Edmonds was a member of the Army National Guard. According to the complaint, Hasan also planned to travel to the Middle East to fight for ISIL.

According to court documents, on Aug. 11, 2015, in the name of the Islamic State Hacking Division (ISHD), Hussain posted a tweet that contained a document with the PII of the approximately 1,300 US military and other government personnel that Ferizi had taken from the victim company and provided to Hussain. 

The document stated, in part, that “we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!” Ferizi admitted that he provided the PII to ISIL with the understanding that ISIL would use the PII to “hit them hard.”


LawfareBlog:           Justice.gov:

 

 

« IoT 2.0: The Internet of Things-to-Things
Strategies For A Culture of Cyber-Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

ZyberSafe

ZyberSafe

ZyberSafe is an innovative Danish company specialized within building hardware encryption solutions.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

Rezilion

Rezilion

Rezilion is a stealth mode cyber-security start-up developing a cutting edge technology that makes cloud environments self-protecting and resilient to cyber-attacks.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

swIDCH

swIDCH

swIDch is a technology company that aims to eliminate CNP (card not present) Fraud.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

Scrut Automation

Scrut Automation

Scrut Automation's mission is to make compliance less painful and time consuming, so that businesses can focus on running their business.

Mr Backup (MRB)

Mr Backup (MRB)

MRB offers Data Protection as a Service for businesses looking to reduce the time, cost and complexity of securing your company data.

Tenable

Tenable

Organizations around the world rely on Tenable to help them understand and reduce cybersecurity risk across their attack surface—in the cloud or on-premises, from IT to OT and beyond.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Block Harbor Cybersecurity

Block Harbor Cybersecurity

Block Harbor has worked closely with automakers, suppliers, and regulators since 2014 on vehicle cybersecurity.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Stern Cybersecurity

Stern Cybersecurity

Stern Cybersecurity offers a robust defense against the ever-evolving landscape of digital threats.

Potech

Potech

Potech provides masterful services in Information & Technology and Cybersecurity to multiple markets across the world.