Israeli Hackers Have Penetrated ISIS Networks

Israeli government hackers, that broke into the computer networks of ISIS bomb makers, months ago have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines, according to The New York Times.

The report, a sourced to two American officials, say that the intelligence gleaned from the electronic heist was "so exquisite" that it helped US spies get an understanding of how such devices would be detonated.

The Department of Homeland Security in March implemented a ban on electronic devices larger than a cell phone from being carried onto aircraft originating from 10 countries in Africa and the Middle East. A DHS fact sheet said terrorists were trying to smuggle explosives in "various consumer items."

According to the this report, ISIS was fashioning explosives that would look just like a battery in a laptop computer.
Though the revelation uncovered by Israeli hackers is one success in the cyber war against ISIS, the Times report notes that the US and others have had a more difficult time going after the terror group online. Unlike other cyber operations against Iran and North Korea, which caused setbacks to both countries' nuclear programs, ISIS has limited technical infrastructure, and relies on technology less for weapons in favor of recruiting and propaganda efforts.

Still, the US has in recent years significantly upped its cyber capabilities and placed hackers close by grunts, helping them confuse and deceive the enemy on the battlefield.
“Even if you think about the way that IEDs are triggered," said Charlie Stadtlander, chief spokesperson for US Army Cyber Command, using the acronym for improvised explosive devices, in a 2016 interview with Business Insider. "Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”
“Denying the ability to coordinate, communicate, and assess," Stadtlander added. "That’s an advantage that we might be able to leverage.”

Ein News

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Major Cyber-Attack Prevented:

 

« Healthcare Sector Accounts For 43% Of UK Data Breaches
Machine Learning Writes Better Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Wallix

Wallix

Wallix is a software company offering privileged access management solutions for enterprises, public organizations and cloud service providers

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF)

Technology Industries of Finland (TIF) is a business and labour market lobbying organization that promotes the competitiveness and business conditions of Finland’s most crucial export industry.

Network Box

Network Box

Network Box is one of the world's leading Managed Security Service Providers.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

ABS Group

ABS Group

ABS Group provides risk and reliability solutions and technical services that help clients confirm the safety, integrity and security of critical assets and operations.

Perch Security

Perch Security

Perch is a co-managed threat detection and response platform backed by an in-house Security Operations Center (SOC).

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Nardello & Co

Nardello & Co

Nardello & Co. is a global investigations firm with experienced professionals handling a broad range of issues including Digital Investigations & Cybersecurity.

Automation Workz

Automation Workz

Automation Workz has been ranked as a top 10 Cybersecurity Bootcamp in the US by Career Karma.

MajorKey Technologies

MajorKey Technologies

MajorKey improves security performance by reducing user friction and business risk, empowering your people, and protecting your IP.

OutKept

OutKept

OutKept offers the highest quality phishing simulation campaigns, supported by a community of ethical phishers, to build awareness, and maintain alertness.

Xcelerate Solutions

Xcelerate Solutions

Xcelerate Solutions is a leading defense and national security company, providing integrated solutions in three service areas – Enterprise Security, Digital Transformation, and Strategic Consulting.

GAM Tech

GAM Tech

GAM Tech is a Managed IT Service Provider that serves small and medium sized businesses in Alberta, British Columbia, Ontario and Quebec.