Anonymous Acts on Cyber War Threat

 

Hacktivist group, Anonymous, has already made true on its declaration of cyber war on terrorist group ISIS. In the space of 48 hours, over 5 000 Twitter accounts linked to ISIS have been taken down.

This follows a video, in response to Friday night's terror attacks in Paris, featuring one of the masked hacktivists saying: "Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you. Expect massive cyber attacks. War is declared. Get prepared."
A Twitter account, @opparisofficial, was started by Anonymous, for people to follow the progress of the attacks. The account already has over 28 000 followers.
The account tweeted: "More than 3 824 Twitter accounts pro #ISIS are now #down!"
Also, it was tweeted the number of Twitter accounts taken down had risen to 5 500.

The account did say no action would be taken until the flagged Twitter accounts were verified. "Accounts will then be passed on for surveillance."

A separate Twitter account, linked to Anonymous, announced: "#Anonymous has now seized hundreds of underground #ISIS recruitment sites and forums. We've also leaked info on registered accounts. #OpParis."

"Our capability to take down ISIS is a direct result of our collective's sophisticated hackers, data miners, and spies that we have all around the world. We have people very, very close to ISIS on the ground, which makes gathering intel about ISIS and related activities very easy for us," an Anonymous spokesman told RT.
Another Anonymous ‏account, @TheAnonMovement, tweeted: "We will not stop until there is a total blackout for #ISIS online."

ISIS has allegedly used the messaging service, Telegram (which allows for end-to-end encrypted communication), to communicate instructions on how to avoid hacks by Anonymous.
"The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," the statement read in part – according to Business Insider.

The instructions included telling members not to open links from unknown sources, constantly change IP addresses, and not to talk to strangers on various messaging services.
Ein News: http://bit.ly/1jfugnS

 

« After Paris, ISIS Moves Propaganda Machine to Darknet
Britain Building Cyber Forces to Attack ISIS »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

JumpCloud

JumpCloud

JumpCloud's Directory-as-a-Service (DaaS) is the single point of authority to authenticate, authorize, and manage the identities of a business’s employees and the systems and IT resources they need.

Opengear

Opengear

Opengear ensures network resilience to enterprises by enabling business continuity with the Network Resilience Platform.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Quadible

Quadible

Quadible BehavAuth is an AI-platform that continuously authenticates the users, without the need of any input, by learning their behavioural patterns.

Critical Insight

Critical Insight

Critical Insight provide Managed Detection and Response, Vulnerability Detection, and Consulting Services to help you secure your mission-critical systems.

Blockchain Solutions

Blockchain Solutions

Blockchain Solutions Limited is a technological One Stop Solution provider, for Blockchain technology.

Cohesity

Cohesity

Cohesity radically simplifies the way businesses back up, manage, protect, and extract value from their data—in the data center, at the edge, and in the cloud.

Infinite Ranges

Infinite Ranges

Infinite Ranges delivers secure, comprehensive digital solutions by connecting experts with the best products and services for the digital age.

Enzen

Enzen

Enzen is a global knowledge practice that provides consulting, technology, engineering, operating and innovation services to the energy and utility sectors.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

The Hacking Games

The Hacking Games

The Hacking Games' Mission is to inspire, educate and mobilise a generation of ethical hackers to make the world a safer place.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

AZCOMP Technologies

AZCOMP Technologies

AZCOMP provide professional network security consulting services as well as network security auditing and assessments.