Islamic State Recruits Indian Hackers

Islamic State is recruiting hackers in India to break into government systems, with the India Times reporting that the hackers are being paid over $10,000 for every job they do.

India-based cyber crime expert Kislay Chaudhary told the India Times: “There are various underground communities online where hackers interact regularly. Our investigation reveals that for the past six months lucrative offers for stealing government data came pouring in and hackers were offered huge sums. Such amounts have never been offered to any Indian hacker before.”

Experts in India said that over 30,000 hackers could have already been in contact with Islamic State.

In November Islamic State issued guidelines on how to defend itself against hacking after hacktivist group Anonymous declared “war” in response to the deadly Paris attacks on 13 November.

Anonymous opened an #OpParis Twitter account to provide updates on its campaign against Islamic State and released the names of 9,200 accounts believed to be affiliated with Islamic State.

Islamic State’s own guidance on how to avoid being hacked was discovered by researchers at the International Centre for the Study of Radicalisation, a London think-tank.

The guidelines include a recommendation to use virtual private networking (VPN) tools to create encrypted connections and to change IP address frequently. It also recommend avoiding clicking on links if the source is not known, avoiding the use of direct messages on Twitter, avoiding the use of email accounts as Twitter user names, and blocking and avoiding talking to unknown contacts on Telegram.

ComputerWeekly: 

« Super High-Speed Internet
What Should You Do If Your Business Is Hacked? (£) »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Identity Automation

Identity Automation

Identity Automation is a leading provider of Identity and Access Management software.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

Xperien

Xperien

Xperien is a leading South African Information Technology Asset Disposition (ITAD) company.

CyberQ Group

CyberQ Group

CyberQ is an award winning cyber security consultancy and services provider and an innovator in Artificial Intelligence and Automated Cyber Security.

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

ERI

ERI

ERI is the largest fully integrated IT and electronics asset disposition provider and cybersecurity-focused hardware destruction company in the United States.

Palantir

Palantir

Palantir software empowers entire organizations to answer complex questions quickly by bringing the right data to the people who need it.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

LogMeIn

LogMeIn

LogMeIn makes it possible for millions of people and businesses around the globe to do their best work simply and securely—on any device, from any location and at any time.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Sectricity

Sectricity

As independent ethical hackers, Sectricity go beyond traditional security, uncovering every vulnerability - testing both systems and employees to eliminate weak spots.

Claratti

Claratti

Clarrati are a team of innovators. Industry leaders in the cloud computing, remote working, and work-from-home space. We partner with you to empower your business for the future.