Israeli Hackers Have Penetrated ISIS Networks

Israeli government hackers, that broke into the computer networks of ISIS bomb makers, months ago have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines, according to The New York Times.

The report, a sourced to two American officials, say that the intelligence gleaned from the electronic heist was "so exquisite" that it helped US spies get an understanding of how such devices would be detonated.

The Department of Homeland Security in March implemented a ban on electronic devices larger than a cell phone from being carried onto aircraft originating from 10 countries in Africa and the Middle East. A DHS fact sheet said terrorists were trying to smuggle explosives in "various consumer items."

According to the this report, ISIS was fashioning explosives that would look just like a battery in a laptop computer.
Though the revelation uncovered by Israeli hackers is one success in the cyber war against ISIS, the Times report notes that the US and others have had a more difficult time going after the terror group online. Unlike other cyber operations against Iran and North Korea, which caused setbacks to both countries' nuclear programs, ISIS has limited technical infrastructure, and relies on technology less for weapons in favor of recruiting and propaganda efforts.

Still, the US has in recent years significantly upped its cyber capabilities and placed hackers close by grunts, helping them confuse and deceive the enemy on the battlefield.
“Even if you think about the way that IEDs are triggered," said Charlie Stadtlander, chief spokesperson for US Army Cyber Command, using the acronym for improvised explosive devices, in a 2016 interview with Business Insider. "Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”
“Denying the ability to coordinate, communicate, and assess," Stadtlander added. "That’s an advantage that we might be able to leverage.”

Ein News

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Major Cyber-Attack Prevented:

 

« Healthcare Sector Accounts For 43% Of UK Data Breaches
Machine Learning Writes Better Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BH Consulting

BH Consulting

BH Consulting we are a vendor independent consulting firm providing market leading range of information security services focused on data protection and cybersecurity.

ProPay

ProPay

ProPay provides secure payment solutions for organizations ranging from small businesses to large enterprises requiring complex payment solutions.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Cybersecurity Advisors Network (CyAN)

Cybersecurity Advisors Network (CyAN)

CyAN provides a not-for-profit platform that helps private and public organisations as well as governments to identify trusted advisors in the area of Cyber Security and Cyber Crime.

Atakama

Atakama

With Atakama, data remains encrypted until the very moment it is used, and the ability to decrypt is based on zero trust architecture.

Tactic Labs

Tactic Labs

Tactic Labs (part of the Avnon Group) delivers a holistic Cyber-Security Management Platform which provides military-grade protection, safeguarding critical infrastructures and mission-critical data.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

ClearVector

ClearVector

ClearVector is a leading provider of realtime, identity-driven security for the cloud.

ProCheckUp

ProCheckUp

ProCheckUp is a London-based independent provider of cyber security services, including IT Security, Assurance, Compliance and Incident Response.

Yotta Infrastructure Solutions

Yotta Infrastructure Solutions

Yotta Infrastructure, a Hiranandani group company, provide Datacenter Colocation and Tech Services such as Cloud services, Network & Connectivity, IT Security and IT Management services.

xdr.global

xdr.global

Xdr.global is a cybersecurity consulting firm, focused on promoting and aligning Extended Detection and Response (XDR) security solutions.

Veza Technologies

Veza Technologies

Veza is the authorization platform for data. Built for hybrid, multi-cloud environments, Veza enables organizations to manage and control who can and should take what action on what data.

Arsen Cybersecurity

Arsen Cybersecurity

Arsen is a French cybersecurity startup, dedicated to enhancing human behaviors in cybersecurity.

SENTRIQS

SENTRIQS

SENTRIQS advanced encryption technology is engineered to defend against the most sophisticated cyber threats, keeping your operations efficient and secure.

NetSfere

NetSfere

NetSfere provides next-generation messaging and mobility solutions to carriers and enterprises globally including its enterprise-grade, secure mobile messaging platform NetSfere Enterprise.

Consortium

Consortium

Consortium goes beyond products and promises by working with enterprises to identify, acquire, and deploy cybersecurity solutions that matter.