Anonymous Acts on Cyber War Threat

 

Hacktivist group, Anonymous, has already made true on its declaration of cyber war on terrorist group ISIS. In the space of 48 hours, over 5 000 Twitter accounts linked to ISIS have been taken down.

This follows a video, in response to Friday night's terror attacks in Paris, featuring one of the masked hacktivists saying: "Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you. Expect massive cyber attacks. War is declared. Get prepared."
A Twitter account, @opparisofficial, was started by Anonymous, for people to follow the progress of the attacks. The account already has over 28 000 followers.
The account tweeted: "More than 3 824 Twitter accounts pro #ISIS are now #down!"
Also, it was tweeted the number of Twitter accounts taken down had risen to 5 500.

The account did say no action would be taken until the flagged Twitter accounts were verified. "Accounts will then be passed on for surveillance."

A separate Twitter account, linked to Anonymous, announced: "#Anonymous has now seized hundreds of underground #ISIS recruitment sites and forums. We've also leaked info on registered accounts. #OpParis."

"Our capability to take down ISIS is a direct result of our collective's sophisticated hackers, data miners, and spies that we have all around the world. We have people very, very close to ISIS on the ground, which makes gathering intel about ISIS and related activities very easy for us," an Anonymous spokesman told RT.
Another Anonymous ‏account, @TheAnonMovement, tweeted: "We will not stop until there is a total blackout for #ISIS online."

ISIS has allegedly used the messaging service, Telegram (which allows for end-to-end encrypted communication), to communicate instructions on how to avoid hacks by Anonymous.
"The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," the statement read in part – according to Business Insider.

The instructions included telling members not to open links from unknown sources, constantly change IP addresses, and not to talk to strangers on various messaging services.
Ein News: http://bit.ly/1jfugnS

 

« After Paris, ISIS Moves Propaganda Machine to Darknet
Britain Building Cyber Forces to Attack ISIS »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Serena

Serena

Serena Software helps increase speed of the software development lifecycle while enhancing security, compliance, and performance.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

XTN Cognitive Security

XTN Cognitive Security

XTN is focused on the development of security, Fraud and Mobile Threat Prevention advanced behaviour-based solutions.

Havelsan

Havelsan

HAVELSAN is a leading technology company in Turkey developing indigenous systems for domestic and foreign military, public and private sector clients.

Carbonite

Carbonite

Carbonite offers all the tools necessary for protecting data from the most common forms of data loss, including ransomware, accidental deletions, hardware failures and natural disasters.

Red River

Red River

Red River is a technology transformation company, bringing 25 years of experience and mission-critical expertise in analytics, cloud, collaboration, mobility, networking and security solutions.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

Paradyn

Paradyn

Paradyn-managed security services can provide a holistic view of your business environment, no matter how simple or complex it is.

Visory

Visory

Great businesses depend on great technology. We make sure our clients go to market with enterprise-level technology and world-class security for their data and infrastructure.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Gilsbar

Gilsbar

For more than half a century, Gilsbar has offered insurance service solutions and support for businesses and their employees.

Benchmark IT Services (BITS)

Benchmark IT Services (BITS)

BITS is a leading cyber security company in Australia. Our certified professionals work with you to keep your data assets safe and secure.

Vantor

Vantor

Vantor is a Managed Security Services Provider (MSSP) that specializes in providing outsourced, managed cybersecurity services.

DataKrypto

DataKrypto

DataKrypto’s advanced data encryption solutions protect data throughout its lifecycle.

Harness

Harness

Harness delivers an end-to-end software delivery platform that helps engineering teams achieve the highest levels of engineering excellence.

Runtime Ventures

Runtime Ventures

Runtime Ventures focuses on seed and pre-seed stage cybersecurity investments. We love to work with ambitious founders building the future of the secure enterprise.