Anonymous Acts on Cyber War Threat

 

Hacktivist group, Anonymous, has already made true on its declaration of cyber war on terrorist group ISIS. In the space of 48 hours, over 5 000 Twitter accounts linked to ISIS have been taken down.

This follows a video, in response to Friday night's terror attacks in Paris, featuring one of the masked hacktivists saying: "Anonymous from all over the world will hunt you down. You should know that we will find you and we will not let you go. We will launch the biggest operation ever against you. Expect massive cyber attacks. War is declared. Get prepared."
A Twitter account, @opparisofficial, was started by Anonymous, for people to follow the progress of the attacks. The account already has over 28 000 followers.
The account tweeted: "More than 3 824 Twitter accounts pro #ISIS are now #down!"
Also, it was tweeted the number of Twitter accounts taken down had risen to 5 500.

The account did say no action would be taken until the flagged Twitter accounts were verified. "Accounts will then be passed on for surveillance."

A separate Twitter account, linked to Anonymous, announced: "#Anonymous has now seized hundreds of underground #ISIS recruitment sites and forums. We've also leaked info on registered accounts. #OpParis."

"Our capability to take down ISIS is a direct result of our collective's sophisticated hackers, data miners, and spies that we have all around the world. We have people very, very close to ISIS on the ground, which makes gathering intel about ISIS and related activities very easy for us," an Anonymous spokesman told RT.
Another Anonymous ‏account, @TheAnonMovement, tweeted: "We will not stop until there is a total blackout for #ISIS online."

ISIS has allegedly used the messaging service, Telegram (which allows for end-to-end encrypted communication), to communicate instructions on how to avoid hacks by Anonymous.
"The #Anonymous hackers threatened in new video release that they will carry out a major hack operation on the Islamic state (idiots)," the statement read in part – according to Business Insider.

The instructions included telling members not to open links from unknown sources, constantly change IP addresses, and not to talk to strangers on various messaging services.
Ein News: http://bit.ly/1jfugnS

 

« After Paris, ISIS Moves Propaganda Machine to Darknet
Britain Building Cyber Forces to Attack ISIS »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Phoenix TS

Phoenix TS

Phoenix TS offers world-class management, computer, and IT security certification training courses.

Juniper Networks

Juniper Networks

Juniper Networks is the industry leader in network innovation. We provide network infrastructure and network security solutions.

Australian Signals Directorate (ASD)

Australian Signals Directorate (ASD)

The Australian Signals Directorate is an intelligence agency in the Australian Government Department of Defence.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Etonwood

Etonwood

Etonwood specialises in infrastructure and vendor technology recruitment in areas including cloud platforms, cyber security and service management.

Binary Security AS

Binary Security AS

Binary Security is a Norwegian information security consultancy company. We are specialists at application security, penetration testing and secure code reviews.

Digital Boundary Group (DBG)

Digital Boundary Group (DBG)

Digital Boundary Group (DBG) is an information technology security assurance services firm providing information technology security auditing and compliance assessment services to clients worldwide.

Cyber Security Services

Cyber Security Services

Cyber Security Services is a cyber security consulting firm and security operations center (SOC).

Purism

Purism

Purism works with hardware component manufactures and the free software community to build high quality hardware that respects your digital life.

Trustaira

Trustaira

Trustaira is the first deep tech solution and service company in Bangladesh.

USX Cyber

USX Cyber

USX Cyber was founded on the idea that small and medium businesses deserve and require the same level and sophistication of cyber protection as large enterprises.

Scribe Security

Scribe Security

Scribe security provides end-to-end software supply chain security solutions.