UK Launches Cyber Attack On Islamic State

The UK has conducted a "major offensive cyber-campaign" against the Islamic State group, the director of the intelligence agency GCHQ has revealed.

The operation hindered the group's ability to co-ordinate attacks and suppressed its propaganda, former MI5 agent Jeremy Fleming said.

It is the first time the UK has systematically degraded an adversary's online efforts in a military campaign.

Mr Fleming made the remarks in his first public speech as GCHQ director. "The outcomes of these operations are wide-ranging," he told the Cyber UK conference in Manchester.

"In 2017 there were times when Daesh [an alternative name for Islamic State] found it almost impossible to spread their hate online, to use their normal channels to spread their rhetoric, or trust their publications."

Mr Fleming said much of the cyber-operation was "too sensitive to talk about", but had disrupted the group's online activities and even destroyed equipment and networks. "This campaign shows how targeted and effective offensive cyber can be," he added.

But Mr Fleming said the fight against IS was not over, because the group continued to "seek to carry out or inspire further attacks in the UK" and find new "ungoverned spaces to base their operations".

'Blurring boundaries'

Mr Fleming also criticised Russia over what he called "unacceptable cyber-behaviour" that was a "growing threat" to the UK and its allies.

He recalled the NotPetya ransomware attack on Ukraine last year, which eventually spread across the world. The UK and US later said the Russian military were behind the attack, a claim that Moscow denied.

"They're not playing to the same rules," Mr Fleming said. "They're blurring the boundaries between criminal and state activity."

He said the use of a nerve agent on Sergei and Yulia Skripal in Salisbury was "stark and shocking", and demonstrated "how reckless Russia is prepared to be".

The UK has said Moscow was "culpable" for the attack, but Russia denies any involvement.

"The robust response from the UK and from the international community shows the Kremlin that illegal acts have consequences. And it looks like our expertise on Russia will be in increasing demand," he said.

Following the speech, the chief executive of the National Cyber Security Centre, Ciaran Martin, told the BBC the Notpetya case was also an example of the Russian recklessness mentioned by Mr Fleming.

Asked if the disclosures about offensive cyber-actions were a veiled warning to Russia, Mr Martin said sometimes the best form of defence is defence.

Mr Fleming went on to describe some of GCHQ's other goals, which include tracking down people who use the dark web to distribute child sex abuse images.

Cyber has created a new landscape for attackers and defenders, he said, and the challenges were "vast" but were being met by a strong and lawful GCHQ.

On Wednesday 11th April, Mr Fleming announced new GCHQ base is to open in Manchester hoping to draw "tech savvy recruits".

BBC

You Kight Also Read: 

Islamic State Likely To Switch To Cyber Warfare:

« Cyber Attacks Focus On Healthcare
Vigilante Hackers Attack Nation States »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Howden Broking Group

Howden Broking Group

Howden provides a range of specialist insurance solutions to clients around the world including Cyber Liability insurance.

CSI

CSI

CSI is a Managed Service Provider (MSP) delivering Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions to highly regulated industries.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Augusta HiTech

Augusta HiTech

Augusta Hitech is a focused product development, software services and technology consulting company. Our Vision is to become the most socially impactful and innovative technology company in the world

BrandProtections.Online

BrandProtections.Online

BrandProtections.online offer end-to-end customer support solutions to help protect against threats which may affect your brand online.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Spinnaker Support

Spinnaker Support

Spinnaker Support is a premier global provider of on-premise and cloud-based enterprise software support services.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Cypago

Cypago

Cypago provides a powerful yet easy-to-use Compliance Orchestration Platform to automate the compliance process end-to-end.

coc00n

coc00n

coc00n secures the devices of high-value and high-interest individuals against cyber attacks.

Irys Technologies

Irys Technologies

Irys Technologies specialize in pioneering digital transformation solutions designed to streamline communications and enhance maintenance and operational efficiency for a variety of sectors.

Interlock

Interlock

Interlock are building blockchain-based security products that solve legacy web2 security issues - phishing and social engineering.

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre (JCSC)

Jersey Cyber Security Centre is the jurisdiction's Cyber Emergency Response Team (CERT) and national technical authority for cyber security.

Skylark

Skylark

Skylark is a leading global IT services provider, transforming client’s businesses through innovative and advanced technology solutions.