Is The TalkTalk Hack a Jihadist Attack?

 

Rumours have circulated on social media about the notorious LulzSec hacking group being responsible for breaking in to the telecoms company TalkTalk’s customer data.  Now, Islamic extremists have claimed responsibility for the hack on the UK broadband provider, revealing another strand in the web of funding that pays for a campaign of terror.
 
Jihadists who have also claimed responsibility for the massive hack attack on broadband provider TalkTalk claim to have begun their 'cyber holy war' on the UK. Russian-based Islamic extremists said they were the ones who carried out the “significant and sustained cyber attack” on the British company.

Their claims come after TalkTalk boss Dido Harding said she had received a ransom message.
She said: "I personally received a contact from someone purporting, as I say I don’t know whether they are or are not, to be the hacker looking for money."

And then hours later the Jihadi cyber hackers shared a message online that read: "We have made our tracks untraceable through onion routing, encrypted chat messages, private key emails, hacked servers.
"We will teach our children to use the web for Allah. Your hands will be covered in blood. Judgement Day is soon."
 
TalkTalk admits that it does not know how many customers are affected - nor if their personal data is encrypted.
But it is now feared that the attack could be one of many examples in which terror groups like ISIS fund their sick crimes.
British OAPs are being duped by jihadist cold-callers to help fund terrorism in the Middle East.

The London-based tricksters - who may or may not be acting independently of the supposed hackers - pose as police or bank staff and claim their victim’s account is compromised, before sending fake couriers to collect bank cards and details. Their cash is then plundered, the Financial Action Task Force has warned. Some people in Devon, Cornwall, Dorset, Bedfordshire, Kent and London, have been hit so far. But these hacks cannot be carried out by anyone - terror organisations need to recruit experts.

Scores of computer experts, are thought to have been recruited by ISIS, to plunder millions from UK banks and businesses in recent months. The jihadist group spreading death and mayhem across Iraq and Syria is already the world’s richest rebel organisation with more than £1.5billion at its disposal.

British hacker Junaid Hussain, 20, jailed in 2012 for stealing personal information from Tony Blair and posting it online, was thought earlier this year to have been masterminding a plan to bring in countless millions more.

Hussain, from Birmingham, travelled to Syria last year while supposedly under police supervision. He was believed to be teaching other hackers how to crack the code used to safeguard passwords and sensitive information - however reports in August claimed that he was killed in a US airstrike. 

The hackers haven't just targeted TalkTalk.They're known to have gone after big accounts belonging to businesses, VIPs and celebrities from around the world. Last year, a source told the Mirror: "This is a new dawn of warfare. This is not a sporadic operation.

"The hackers are targeting the accounts of the rich and famous, VIP clients of banks and big businesses. This is an international fraud on an unprecedented scale and the result could be a bottomless pit of money to fund their campaign of terror."

Thanks to the instability in the region, ISIS militants were able to seize control of large Syrian oil fields. This has allowed the terror group to trade with middlemen hoping to make a large amount of cash. But authorities say they are trying to crack down on those involved in oil trade with ISIS.
"The middlemen, traders, refiners, transport companies, and anyone else that handles [ISIS's] oil should know that we are hard at work identifying them, and that we have tools at hand to stop them," David Cohen, the undersecretary for terrorism and financial intelligence at the US treasury, has said.

In the aftermath of the US invasion of Iraq, Sunni militants joined with Saddam Hussein’s former generals to form a powerful alliance which has gone on to become ISIS. An alliance whose tentackes extend into cyberspace and directly into the homes  and bank accounts of TalkTalk's British customers.

Ein News:http://http://bit.ly/1jNh5fb

 

 

 

« Cyber Warfare: Regional Is Becoming Global
Major Cybersecurity Bill Clears US Senate »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyanre

Cyanre

Cyanre delivers state of the art cyber forensic services through software technologies and procedures that exceed conformities of major law enforcement agencies across the globe.

Subex

Subex

Subex leverages its award-winning telecom analytics solutions in areas such as Revenue Assurance, Fraud Management, Asset Assurance and Partner Management, and IoT Security.

Cyber Threat Alliance

Cyber Threat Alliance

CTA is working to improve cybersecurity of our digital ecosystem by enabling near real-time cyber threat information sharing among companies and organizations in the cybersecurity field.

ArcRan Information Technology

ArcRan Information Technology

ArcRan concentrates on developing comprehensive cybersecurity solutions for smart city applications. We believe that cybersecurity is the fundamental enabler of IoT development.

Hub One

Hub One

Hub One is a leading player in digital transformation with expertise in broadband connectivity, business solutions for traceability and mobility, IOT in industrial environments and cybersecurity.

DataViper

DataViper

DataViper is a threat intelligence platform designed for organizations, investigators, and law enforcement.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

Bolster

Bolster

Bolster (formerly RedMarlin) is an AI-based cyber-security platform designed to detect phishing and fraudulent sites in real-time.

CyberCyte

CyberCyte

CyberCyte provides a disruptive built-in integrated physical, network and perimeter security solution framework.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

Oregon Systems

Oregon Systems

Oregon Systems is a Regional Leader & Distributor with value added services for OT, IoT, IIoT & IT Cybersecurity products, Solutions & professional services throughout the middle-east region.

Aeries Technology

Aeries Technology

Aeries is a technology services organization offering capabilities in Technology Services, Digital Transformation, and Business Process Management.

Techmentum

Techmentum

At Techmentum, our mission is to utilize technology to help companies succeed. Our expertise includes fully managed IT services, cybersecurity, cloud, and custom technology solutions.

Tausight

Tausight

Tausight is an AI-Powered patient data security startup with a mission of reducing healthcare cyber incidents using a more proactive, risk management philosophy.

Iron Mountain

Iron Mountain

Iron Mountain Incorporated is a global business dedicated to storing, protecting and managing, information and assets.