ISIS Warns Of Imminent Cyber Attacks On The US

An online group that supports the Islamic State has released a new video warning of an upcoming cyber war. The group has named the United States as its first target, according to analysts at JihadoScope.

The group, which was identified by JihadoScope as “Electronic Ghosts of the Caliphate,” claimed to be the “hackers of the Islamic State” and threatened cyber-attacks against the enemies of ISIS, starting with an attack against the US planned for this month. “We will face you with a massive cyber war,” the group, which calls itself “Caliphate Cyber Ghosts.” warned in the video, and described the planned cyber-attacks as "Black days you will remember".

The video first surfaced online midday Monday 4th December and has been spread online via Twitter, Vimeo, Facebook and other platforms. "Electronic Ghosts of the Caliphate" is one of more than one dozen hacking groups that merged in 2016 under the banner of the United Cyber Caliphate, which had been dormant for months before resurfacing in recent weeks, according to JihadoScope. "The group is threatening to 'penetrate' websites including government and military, while identifying America as their first target," Gluck told IBT. The analyst explained that it is not typical for groups to name the date of their attack. "It’s possible that naming a date is a response to the so-called Islamic State ‘hackers’ who struck a couple of weeks back and predicted the Friday November 17th as their day of activity," Gluck said. "Perhaps putting forward a date is an attempt to project a great threat."

The group is just the latest pro-ISIS group to promise a return to cyber warfare, where ISIS has been somewhat stifled since crackdowns on the terrorist organization’s activity were implemented by major tech companies and social media sites.
According to a post made in November by JihadoScope, the hacking collected identified as UCC announced that it would resume its operations, carrying out hacks and cyber-attacks against a number of targets, including Facebook and Twitter accounts and websites.

The group threatened to hack websites and turn them into tools of pro-ISIS media and spread their message using hacked social media accounts. It highlighted this effort by showing a number of Twitter accounts the group successfully compromised, a task that can be done by buying stolen credentials off the dark web and does not necessarily require any technical hacking skills.

UCC has a history of executing attention-grabbing online campaigns. The group netted headlines in 2016 and earlier this year after it published “kill lists” that contained the names and addresses of thousands of individuals in the US and United Kingdom.

Despite the shocking behavior that is successful in generating fear, the group has not received much praise for its actual hacking capabilities. Kyle Wilhoit, a senior security researcher at DomainTools, described the coding skills of UCC as “garbage” earlier this year at security conference DerbyCon in Kentucky. “As it stands ISIS are not hugely operationally capable online,” he said.

The increased activity online from ISIS comes just weeks after a group of Muslim hackers claimed to have taken down the terrorist group’s news websites, including Amaq. The group also set up fake websites designed to look like the news sites in order to spread disinformation through ISIS channels. 

While the group of Muslim hackers also claimed it would release ISIS communications intercepted from messaging apps, it did not follow through on the threat.

IB Times

You Might Also Read:

Facebook, Twitter and Google Are A 'recruiting platform for terrorism'':

Terrorist Activities On Social Media:

Facebook Algotithms Will Identify Terrorists: 

 

« The GDPR Advisory Board Offers Expert Advice
German Spies Warn Of Chinese Espionage »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Globalscape

Globalscape

Globalscape is a leader in secure data exchange solutions.

Norwegian Business & Industry Security Council (NSR)

Norwegian Business & Industry Security Council (NSR)

NSR is a member organization serving the Norwegian business sector in an advisory capacity on matters relating to crime and security including cyber.

RedLock

RedLock

The RedLock Cloud 360TM platform correlates disparate security data sets to provide a unified view of risks across fragmented cloud environments.

Magix Security

Magix Security

Magix Security assesses the cyber threat, gives you visibility of how vulnerable your business is to attack, and provides cybercrime detection and prevention services.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

APERIO

APERIO

APERIO, the global leader in industrial data integrity, helps its customers drive profitability and sustainability while mitigating risk in their industrial operations.

Rigado

Rigado

Rigado's mission is to enable commercial IoT success by providing high-performance secure and scalable wireless edge connectivity and network infrastructure.

CyCognito

CyCognito

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed.

Bloc Ventures

Bloc Ventures

Bloc Ventures is an investment company providing long-term, ‘patient’ equity capital to early stage unquoted deep technology companies.

ProLion

ProLion

ProLion provides Data Integrity solutions that ensure organisations’ data remains secure, compliant, manageable and accessible.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Aravo Solutions

Aravo Solutions

Your Extended Enterprise is full of hidden risks – Aravo makes them visible, measurable, and manageable.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Action Fraud

Action Fraud

Action Fraud is the UK’s national reporting centre for fraud and cyber crime where you should report fraud if you have been scammed, defrauded or experienced cyber crime.

Xact IT Solutions

Xact IT Solutions

Xact IT Solutions are a certified cybersecurity firm offering cybersecurity, compliance and managed services.