Israeli Hackers Have Penetrated ISIS Networks

Israeli government hackers, that broke into the computer networks of ISIS bomb makers, months ago have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines, according to The New York Times.

The report, a sourced to two American officials, say that the intelligence gleaned from the electronic heist was "so exquisite" that it helped US spies get an understanding of how such devices would be detonated.

The Department of Homeland Security in March implemented a ban on electronic devices larger than a cell phone from being carried onto aircraft originating from 10 countries in Africa and the Middle East. A DHS fact sheet said terrorists were trying to smuggle explosives in "various consumer items."

According to the this report, ISIS was fashioning explosives that would look just like a battery in a laptop computer.
Though the revelation uncovered by Israeli hackers is one success in the cyber war against ISIS, the Times report notes that the US and others have had a more difficult time going after the terror group online. Unlike other cyber operations against Iran and North Korea, which caused setbacks to both countries' nuclear programs, ISIS has limited technical infrastructure, and relies on technology less for weapons in favor of recruiting and propaganda efforts.

Still, the US has in recent years significantly upped its cyber capabilities and placed hackers close by grunts, helping them confuse and deceive the enemy on the battlefield.
“Even if you think about the way that IEDs are triggered," said Charlie Stadtlander, chief spokesperson for US Army Cyber Command, using the acronym for improvised explosive devices, in a 2016 interview with Business Insider. "Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”
“Denying the ability to coordinate, communicate, and assess," Stadtlander added. "That’s an advantage that we might be able to leverage.”

Ein News

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Major Cyber-Attack Prevented:

 

« Healthcare Sector Accounts For 43% Of UK Data Breaches
Machine Learning Writes Better Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ComSec LLC

ComSec LLC

ComSec perform threat assessments to identify vulnerabilities and help protect businesses against corporate espionage via electronic eavesdropping.

Qualys

Qualys

Qualys is a pioneer and leading provider of cloud security and compliance solutions.

CircleCI

CircleCI

CircleCI’s platform allows developers to rapidly release code (for web and mobile apps) they trust by automating the build, test, and deploy process.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Cyber Security Agency of Singapore (CSA)

Cyber Security Agency of Singapore (CSA)

The CSA is the national agency overseeing cybersecurity strategy, operation, education, outreach, and ecosystem development.

CyberSec.sk

CyberSec.sk

CyberSec.sk is the Slovak portal bringing the latest cyber security news, politics, tips and instructions on how to protect the internet.

Exeon Analytics

Exeon Analytics

Exeon Analytics is a Swiss cyber security company that is specialized in detecting hidden data breaches and advanced cyber attacks.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

Secure Systems Innovation Corp (SSIC)

Secure Systems Innovation Corp (SSIC)

SSIC is a cyber risk analytics firm whose mission is to improve how businesses manage cyber risk through the power of data analytics. SSIC developed the X-Analytics cyber risk decisioning platform.

ITProTV

ITProTV

ITProTV is part of the ACI Learning family of companies providing Audit, Cyber, and IT learning solutions for enterprise and consumer markets.

SHI International

SHI International

SHI International deliver against your IT and business needs, helping you build strategies and solutions that will drive innovation, collaboration and security.

Chainguard

Chainguard

Founded by the industry's leading experts on open source software, security and cloud native development, Chainguard are on a mission to make the software supply chain secure by default.

ArmorPoint

ArmorPoint

ArmorPoint redefines the traditional approach to cybersecurity by combining network operations, security operations, and SIEM technology in one platform.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.