Islamic State Cyber Attacks

 

A very real and dangerous national security cyber threat that results from the combination of terrorism and hacking.

A US federal district court in the Eastern District of Virginia has sentenced Ardit Ferizi, a citizen of Kosovo and resident of Malaysia, to 20 years in prison for providing material support to Islamic State and accessing a protected computer without authorization and obtaining information in order to provide material support to IS.

"This case represents the first time we have seen the very real and dangerous national security cyber threat that results from the combination of terrorism and hacking,” said Assistant Attorney General John Carlin. “This was a wake-up call not only to those of us in law enforcement, but also to those in private industry.”

According to the government’s sentencing memo and press release, the 20-year-old hacker, who was previously arrested several times for cyber-crimes in Kosovo, is the first person to be effectively prosecuted in the US for a combination of terrorism and hacking. 

The government alleges that the defendant indefinitely put the lives of 1,300 US military members and government employees at risk when he passed their personal identifying information to ISIL as part of the terrorist group’s plan to “crowdsource” terrorism.

From April 2015, Ferizi began supporting ISIL by administering a website that hosted ISIL videos and Dabiq, ISIL’s English language magazine. The complaint and supporting affidavit allege that Ferizi then graduated to providing ISIL with the personally identifiable information (PII) of individuals in “kuffar” countries that were attacking the United States. 

Several months later, he took a leap forward when he hacked into the server of an Illinois-based company that sold goods to customers in the United States and abroad. Many of those customers were U.S. military and other government personnel, easily identified by their “.gov” or “.mil” email addresses in the system.

According to the statement of facts accompanying the plea agreement, Ferizi subsequently sent the 27 pages of PII to the now-deceased Junaid Hussain, who released the information via Twitter on August 11th under the name “Islamic State Hacking Division.” ISIL encouraged its supporters to attack the named individuals and warned that "we are extracting confidential data and passing on your personal information to the soldier of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!" The "kill list" included residents of the Eastern District of Virginia.

Aside from being one of the first cyberterrorism cases in the country, this case is interesting in that it highlights the extensive cooperation between the government and industry in the aftermath of the hack. 

Less than two days after the list was published, the victim company contacted the FBI to report a threatening message it had received, Ferizi, unidentified at the time, had sent a threatening email after the company deleted the malware he had placed on the server in order to gain access to their systems. The company quickly provided the FBI with consent to review all information related to their website, which eventually led to the identification of the defendant, via a Malaysia-based IP address.

Presenting a contrast to the cumbersome extradition process in the Irfan Demirtas case, Ferizi had his initial appearance in the US within six months. In September, Malaysian authorities detained Ferizi as he was attempting to leave the country. Like Demirtas, who was charged in the US after he was already under the control of a foreign service, Ferizi was charged via a sealed complaint on October 6th. On October 12th, Malaysian authorities provisionally arrested him at the request of the United States; the case was unsealed three days later, and, on January 22, 2016, Ferizi was extradited to the United States.

In a separate case arising out of the Northern District of Illinois, Hasan R. Edmonds and Jonas M. Edmonds were sentenced to 30 and 21 years, respectively, for conspiring to provide material support to ISIL, according to the Justice Department’s press release.

The two cousins were arrested in March 2015, after planning to carry out an armed attack at the US Army National Guard base in Joliet, Illinois, about 45 minutes southwest of Chicago. Like Bailor Jalloh and Michael Teausant, Hasan Edmonds was a member of the Army National Guard. According to the complaint, Hasan also planned to travel to the Middle East to fight for ISIL.

According to court documents, on Aug. 11, 2015, in the name of the Islamic State Hacking Division (ISHD), Hussain posted a tweet that contained a document with the PII of the approximately 1,300 US military and other government personnel that Ferizi had taken from the victim company and provided to Hussain. 

The document stated, in part, that “we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands!” Ferizi admitted that he provided the PII to ISIL with the understanding that ISIL would use the PII to “hit them hard.”


LawfareBlog:           Justice.gov:

 

 

« IoT 2.0: The Internet of Things-to-Things
Strategies For A Culture of Cyber-Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

TokenOne

TokenOne

TokenOne is a Cyber Security software company that makes it easy to replace passwords, tokens and other forms of authentication with a more secure solution.

Volexity

Volexity

Volexity is a leading provider of threat intelligence and incident suppression services and solutions.

Anglo African

Anglo African

Anglo African is an information technology firm providing end-to-end solutions to different industries, from IT Infrastructure to DataCom as well as Cloud & InfoSec services.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Dice

Dice

Dice is a leading recruitment platform, helping technology professionals manage their careers and employers connect with highly skilled tech talent in specialist areas including cybersecurity.

Beazley

Beazley

Beazley are a specialist insurer with three decades of experience in providing clients with the highest standards of underwriting and claims service worldwide.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

ClubCISO

ClubCISO

ClubCISO is a community of peers, working together to help shape the future of the information security profession by facilitating independent discussion on data security and cyber resilience.

Panther Labs

Panther Labs

Panther’s mission is to make security monitoring fast, flexible and scalable for all security teams.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Intaso

Intaso

Intaso are a boutique head hunting and talent solution firm with specialist Cyber and Information Security expertise.

Plerion

Plerion

Plerion is an all-in-one Cloud Security Platform that supports workloads across AWS, Azure, and GCP delivering cloud security posture management, workload security, data security and more.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

Cloud Carib

Cloud Carib

Cloud Carib is the premier provider of managed cloud services in the Caribbean and Latin American regions.