Israeli Hackers Have Penetrated ISIS Networks

Israeli government hackers, that broke into the computer networks of ISIS bomb makers, months ago have uncovered the terror group's plans to build laptop bombs that could get through airport X-ray machines, according to The New York Times.

The report, a sourced to two American officials, say that the intelligence gleaned from the electronic heist was "so exquisite" that it helped US spies get an understanding of how such devices would be detonated.

The Department of Homeland Security in March implemented a ban on electronic devices larger than a cell phone from being carried onto aircraft originating from 10 countries in Africa and the Middle East. A DHS fact sheet said terrorists were trying to smuggle explosives in "various consumer items."

According to the this report, ISIS was fashioning explosives that would look just like a battery in a laptop computer.
Though the revelation uncovered by Israeli hackers is one success in the cyber war against ISIS, the Times report notes that the US and others have had a more difficult time going after the terror group online. Unlike other cyber operations against Iran and North Korea, which caused setbacks to both countries' nuclear programs, ISIS has limited technical infrastructure, and relies on technology less for weapons in favor of recruiting and propaganda efforts.

Still, the US has in recent years significantly upped its cyber capabilities and placed hackers close by grunts, helping them confuse and deceive the enemy on the battlefield.
“Even if you think about the way that IEDs are triggered," said Charlie Stadtlander, chief spokesperson for US Army Cyber Command, using the acronym for improvised explosive devices, in a 2016 interview with Business Insider. "Or an adversary’s [intelligence, surveillance, and reconnaissance], a lot of these are done through electronics and with internet connections.”
“Denying the ability to coordinate, communicate, and assess," Stadtlander added. "That’s an advantage that we might be able to leverage.”

Ein News

You Might Also Read:

Flight Ban On Laptops 'sparked by IS threat':

Major Cyber-Attack Prevented:

 

« Healthcare Sector Accounts For 43% Of UK Data Breaches
Machine Learning Writes Better Emails »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Information Security Systems (ISSCOM)

Information Security Systems (ISSCOM)

ISSCOM provide services to help companies implement Information Security Management Systems (ISMS) by providing consultancy and hands-on assistance.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Asigra

Asigra

Asigra provides an industry leading cloud backup and recovery software platform called Asigra Cloud Backup.

Finjan Holdings

Finjan Holdings

Finjan solutions are aimed at keeping the web, networks, and endpoints safe from malicious code and security threats.

Center for Strategic Cyberspace & International Studies (CSCIS)

Center for Strategic Cyberspace & International Studies (CSCIS)

CSCIS seeks to advance global cyberspace security and prosperity by providing strategic insights for cyberspace and policy solutions to decision makers.

NXO France

NXO France

NXO is an independent leader in the integration and management of digital workflows with services covering digital infrastructures, communications & collaboration, and security.

Protiviti

Protiviti

Protiviti consulting solutions span critical business problems in technology, business process, analytics, risk, compliance, transactions and internal audit.

TechRate

TechRate

Techrate is an analytics agency focused on blockchain technology and engineering. Or expertise includes security and technical audits of projects.

Kiuwan

Kiuwan

Kiuwan provide software security solutions with SAST and SCA source-code analysis that fit into your DevOps process.

Unit21

Unit21

Unit21 helps protect businesses against adversaries through a simple API and dashboard for detecting and managing money laundering, fraud, and other sophisticated risks across multiple industries.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Ostra Cybersecurity

Ostra Cybersecurity

As a next-generation MSSP, Ostra Cybersecurity combines best-in-class tools, proprietary technology and exceptional talent to deliver Fortune 100-level protection for businesses of all sizes.

NextGen Cyber Talent

NextGen Cyber Talent

NextGen Cyber Talent is a non-profit providing a platform to increase diversity and inclusion in the cybersecurity industry.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

SektorCERT

SektorCERT

SektorCERT is the cybersecurity center for the critical infrastructure sectors in Denmark. We help detect and handle when critical infrastructure is exposed to cyber attacks.

SafeLiShare

SafeLiShare

SafeLiShare’s data security platform unifies encryption strategies for organizations with hybrid and multi-cloud infrastructures, ensuring data is secure regardless of its location.