Pro-ISIS Hackers Threaten the US & EU

isis-hack.jpg?itok=o9OwJbNu

Hackers that support the Islamic State terrorist group have released a video announcing a series of targeted attacks against the US and Europe.
Following the group’s self-proclaimed deadline, the group posted a video stating that it has successfully hacked into the websites of the ‘American leadership.’ No affected politicians or leaders are named in the video, however.

The so-called ‘Message to America’ video shows an image of a digitized, hooded figure, over which a prepared speech is read in both English and Arabic.
 
“We are the hackers of the Islamic State. The electronic war has not yet begun,” states the video. “We observe all the movements you are making from your devices. Soon you will see how we control your electronic world.”
A group calling itself the “Islamic State’s Defenders in the Internet” released the video, but there is no evidence that this group is directly connected to the terrorist organization that currently holds parts of Syria and Iraq.
Unlike previous videos issued by the ISIS, this video was not posted by one of the terrorist organization’s media sites scatted throughout Iraq and Syria. It also uses ISIS as an acronym for the Islamic State, which suggests that the video originated from supporters and not actual members.
Hackers associated with or in support of the Islamic State have already hacked a number of targets this year. These include a number of French municipality websites following the Charlie Hebdo terrorist attacks in Paris, the United States Central Command’s Twitter account back in January, several websites owned by American small businesses, and a French television network.
These attacks notwithstanding, experts doubt the hacking prowess of the Islamic State and feel that the video is meant to capitalize on the media attention surrounding Junaid Hussain, a UK-born hacker who is said to have exchanged tweets with the gunman who participated in an attack in Garland, Texas last week.
Along with the video, several tweets appeared with the hashtag #HelloftheAmericanSystem. 
Tripwire: http://bit.ly/1JWbwlf

 

« Police Scotland Invests £1.5 million in Cybercrime Hub
Iran Ministry Of Defense Hacked By Saudi Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

RangeForce

RangeForce

RangeForce delivers the only integrated cybersecurity simulation and skills analysis platform that combines a virtual cyber range with hand-on training.

Relyum

Relyum

Relyum provides innovative solutions for networking, synchronization and cybersecurity in critical systems.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

LeadingIT

LeadingIT

Leading IT provides IT support, cloud computing, email support, cybersecurity, networking and firewall services to Chicagoland businesses.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

Centraleyes

Centraleyes

Centraleyes (formerly CyGov) is a cutting-edge integrated cyber risk management platform that gives organizations unparalleled understanding of their cyber risk and compliance.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

Xalient

Xalient

Xalient is an IT consulting and managed services business, specialising in modern, software-defined networking, security and communications technologies.

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services

Exceed Cybersecurity & I.T. Services is a premier Managed Internet Technology (I.T.) company with a focus in cybersecurity risk management and CMMC compliance management.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Zuul IoT

Zuul IoT

Zuul take an asset-centric approach to OT security, enabling security teams to protect the critical IIoT/IoT devices that are at the foundation of critical business functions.

Anametric

Anametric

Anametric is developing new technologies and devices for chip scale quantum photonics, with a focus on cybersecurity.

iNovex

iNovex

iNovex is a community of innovators that work together to solve hard problems. We partner with you to meet problems head-on and push boundaries with technology solutions.

Agile Defense

Agile Defense

Agile Defense is an Information Technology services provider, delivering leading-edge Digital Transformation solutions to the Federal Government.

DART Consulting & Training

DART Consulting & Training

DART is a leading cyber training and consultancy company. We enhance our clients’ cyber capabilities by growing and strengthening their frontline defense – the cyber teams.