Anonymous Acts on Cyber War Threat

 

Hacktivist group, Anonymous, has already made true on its declaration of cyber war on terrorist group ISIS. In the space of 48 hours, over 5 000 Twitter accounts linked to ISIS have been taken down.

This follows a video, in response to Friday night's terror attacks in Paris, featuring one of the masked hacktivists saying: "Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you. Expect massive cyber attacks. War is declared. Get prepared."
A Twitter account, @opparisofficial, was started by Anonymous, for people to follow the progress of the attacks. The account already has over 28 000 followers.
The account tweeted: "More than 3 824 Twitter accounts pro #ISIS are now #down!"
Also, it was tweeted the number of Twitter accounts taken down had risen to 5 500.

The account did say no action would be taken until the flagged Twitter accounts were verified. "Accounts will then be passed on for surveillance."

A separate Twitter account, linked to Anonymous, announced: "#Anonymous has now seized hundreds of underground #ISIS recruitment sites and forums. We've also leaked info on registered accounts. #OpParis."

"Our capability to take down ISIS is a direct result of our collective's sophisticated hackers, data miners, and spies that we have all around the world. We have people very, very close to ISIS on the ground, which makes gathering intel about ISIS and related activities very easy for us," an Anonymous spokesman told RT.
Another Anonymous ‏account, @TheAnonMovement, tweeted: "We will not stop until there is a total blackout for #ISIS online."

ISIS has allegedly used the messaging service, Telegram (which allows for end-to-end encrypted communication), to communicate instructions on how to avoid hacks by Anonymous.
"The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," the statement read in part – according to Business Insider.

The instructions included telling members not to open links from unknown sources, constantly change IP addresses, and not to talk to strangers on various messaging services.
Ein News: http://bit.ly/1jfugnS

 

« After Paris, ISIS Moves Propaganda Machine to Darknet
Britain Building Cyber Forces to Attack ISIS »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Delphix

Delphix

Delphix is the industry leader for DevOps test data management.

SecureKey Technologies

SecureKey Technologies

SecureKey is a leading identity and authentication provider that simplifies consumer access to online services and applications.

SecureNinja

SecureNinja

SecureNinja provides professional training, certifications & professional services related to all facets of Information Technology and Cyber Security.

TechGuard Security

TechGuard Security

TechGuard Security was founded to address national cyber defense initiatives and US critical infrastructure security.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

TrainACE

TrainACE

TrainACE, is a professional computer training school offering courses in information technology with a focus on Advanced Security training.

XM Cyber

XM Cyber

XM Cyber is a leading hybrid cloud security company that’s changing the way innovative organizations approach cyber risk.

CIRISK

CIRISK

CIRISK offers a wide range of services from consulting to audit or project management to help you develop your cyber security or information security strategy.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

DataSixth Security Consulting

DataSixth Security Consulting

DataSixth delivers Cybersecurity Intelligence. With our unique capabilities, we’re able to deliver value, deliver answers, and deliver actionable security intelligence.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Gotham Digital Science (GDS)

Gotham Digital Science (GDS)

Gotham Digital Science is an international security services company specializing in Application and Network Infrastructure security, and Information Security Risk Management.

Eureka Security

Eureka Security

Eureka help organizations securely use any cloud data storage technology they need without having to compromise on security.

Endor Labs

Endor Labs

Endor Labs gives developers and security teams the context they need to prioritize open source risk.

Port-IT

Port-IT

Port-IT is a leading partner in cybersecurity solutions tailored for the maritime industry.

Morrow Global Network

Morrow Global Network

Morrow is the global venture network for venture accelerators, studios, hubs, and their visionary leaders.