Israeli Hackers Have Penetrated ISIS Networks

Israeli government hackers, that broke into the computer networks of ISIS bomb makers, months ago have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines, according to The New York Times.

The report, a sourced to two American officials, say that the intelligence gleaned from the electronic heist was "so exquisite" that it helped US spies get an understanding of how such devices would be detonated.

The Department of Homeland Security in March implemented a ban on electronic devices larger than a cell phone from being carried onto aircraft originating from 10 countries in Africa and the Middle East. A DHS fact sheet said terrorists were trying to smuggle explosives in "various consumer items."

According to the this report, ISIS was fashioning explosives that would look just like a battery in a laptop computer.
Though the revelation uncovered by Israeli hackers is one success in the cyber war against ISIS, the Times report notes that the US and others have had a more difficult time going after the terror group online. Unlike other cyber operations against Iran and North Korea, which caused setbacks to both countries' nuclear programs, ISIS has limited technical infrastructure, and relies on technology less for weapons in favor of recruiting and propaganda efforts.

Still, the US has in recent years significantly upped its cyber capabilities and placed hackers close by grunts, helping them confuse and deceive the enemy on the battlefield.
“Even if you think about the way that IEDs are triggered," said Charlie Stadtlander, chief spokesperson for US Army Cyber Command, using the acronym for improvised explosive devices, in a 2016 interview with Business Insider. "Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”
“Denying the ability to coordinate, communicate, and assess," Stadtlander added. "That’s an advantage that we might be able to leverage.”

Ein News

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Major Cyber-Attack Prevented:

 

« Healthcare Sector Accounts For 43% Of UK Data Breaches
Machine Learning Writes Better Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ReadWrite

ReadWrite

ReadWrite is a leading media platform dedicated to IoT and the Connected World.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Telia Cygate

Telia Cygate

Cygate are specialists in information security, data networks, and data centre and cloud technologies.

Swiss Cyber Storm

Swiss Cyber Storm

Swiss Cyber Storm is a non profit organization hosting the international Swiss Cyber Storm Conference and running the Swiss part of the European Cyber Security Challenges.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

DataArt

DataArt

DataArt is a global technology consultancy that designs, develops and supports unique software solutions. Areas of activity include software security testing.

H-11 Digital Forensics

H-11 Digital Forensics

H-11 Digital Forensics is a global leader of digital forensic technology.

Eperi

Eperi

Eperi is a leading provider of Cloud Data Protection (CDP) solutions with 15 years of experience in data encryption for databases, (SaaS) applications and files.

Intuity

Intuity

The Intuity suite of services provides companies with a complete awareness of their security status and helps them in an efficient, efficient and sustainable improvement process.

SOOHO

SOOHO

SOOHO helps to detect security vulnerabilities earlier. Our blockchain security platform audits from smart contracts to on-chain transactions.

Institute of Informatics and Telematics (IIT)

Institute of Informatics and Telematics (IIT)

IIT carries out activities of research, assessment, technology transfer and training in the field of Information and Communication Technologies and of Computational Sciences.

OpenZeppelin

OpenZeppelin

OpenZeppelin builds developer tools and performs security audits for distributed systems that power multimillion-dollar economies.

SecureStrux

SecureStrux

SecureStrux are a cybersecurity consulting firm providing specialized services in the areas of compliance, vulnerability assessment, computer network defense, and cybersecurity strategies.

Darkbeam

Darkbeam

Darkbeam provides a unified solution to protect against security, brand and compliance risks across your digital infrastructure.

Guardey

Guardey

Guardey protects thousands of SME's environments. Whether your team works at the office, at home, at the customer or remotely. We protect your business. We do this in an accessible and affordable way.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.