Pro-ISIS Hackers Threaten the US & EU

isis-hack.jpg?itok=o9OwJbNu

Hackers that support the Islamic State terrorist group have released a video announcing a series of targeted attacks against the US and Europe.
Following the group’s self-proclaimed deadline, the group posted a video stating that it has successfully hacked into the websites of the ‘American leadership.’ No affected politicians or leaders are named in the video, however.

The so-called ‘Message to America’ video shows an image of a digitized, hooded figure, over which a prepared speech is read in both English and Arabic.
 
“We are the hackers of the Islamic State. The electronic war has not yet begun,” states the video. “We observe all the movements you are making from your devices. Soon you will see how we control your electronic world.”
A group calling itself the “Islamic State’s Defenders in the Internet” released the video, but there is no evidence that this group is directly connected to the terrorist organization that currently holds parts of Syria and Iraq.
Unlike previous videos issued by the ISIS, this video was not posted by one of the terrorist organization’s media sites scatted throughout Iraq and Syria. It also uses ISIS as an acronym for the Islamic State, which suggests that the video originated from supporters and not actual members.
Hackers associated with or in support of the Islamic State have already hacked a number of targets this year. These include a number of French municipality websites following the Charlie Hebdo terrorist attacks in Paris, the United States Central Command’s Twitter account back in January, several websites owned by American small businesses, and a French television network.
These attacks notwithstanding, experts doubt the hacking prowess of the Islamic State and feel that the video is meant to capitalize on the media attention surrounding Junaid Hussain, a UK-born hacker who is said to have exchanged tweets with the gunman who participated in an attack in Garland, Texas last week.
Along with the video, several tweets appeared with the hashtag #HelloftheAmericanSystem. 
Tripwire: http://bit.ly/1JWbwlf

 

« Police Scotland Invests £1.5 million in Cybercrime Hub
Iran Ministry Of Defense Hacked By Saudi Hacker »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Panda Security

Panda Security

Panda Security specializes in the development of endpoint security products and is part of the WatchGuard portfolio of IT security solutions.

QA Systems

QA Systems

QA Systems provides software testing solutions for safety and business critical sectors and software safety and security standards.

France Cybersecurity

France Cybersecurity

France Cybersecurity represents the French cybersecurity industry to raise international awareness of French cybersecurity capabilities and solutions.

2Secure

2Secure

2Secure is one of Sweden's largest private security companies. Service inlcude personal security, corporate security, information and cyber security.

ID Quantique (IDQ)

ID Quantique (IDQ)

ID Quantique is a world leader in quantum-safe crypto solutions, designed to protect data for the long-term future.

IBLISS Digital Security

IBLISS Digital Security

How cyber-resilient is your business now? We help companies to continuously answer this never-ending C-level question.

oneM2M

oneM2M

oneM2M is a global organization creating a scalable and interoperable standard for communications of devices and services used in M2M applications and the Internet of Things.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Energia Ventures

Energia Ventures

Energia Ventures is a three-month intensive accelerator for entrepreneurs with an innovative business in the energy, smart grid, cleantech, and cybersecurity sectors.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Cybertronium

Cybertronium

Cybertronium is a leader in managing cyber risk. We bring you the latest from the complex, ever-evolving online threat environment with the insights to inspire and the expertise to act.

Pulsant

Pulsant

Pulsant is the UK’s premier digital edge infrastructure company providing next-generation cloud, colocation and connectivity services.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Cybalt

Cybalt

Cybalt is a security services company that provides end-to-end security solutions to help clients achieve their business goals.

SIEM Xpert

SIEM Xpert

SIEM Xpert is a leader in Cyber Security Trainings and services since 2015.

Leostream

Leostream

Leostream's Remote Desktop Access Platform enables seamless work-from-anywhere flexibility while maintaining security and constant visibility of users.