Skip to content
Search

Latest Stories

cipherbrief

Welcome! Log in to stay connected and make the most of your experience.

Input clean

When Terrorists Learn How to Hack

When Terrorists Learn How to Hack

Terrorist groups are expanding their use of the internet beyond mere messaging and disseminating operational know-how, slowly adding a cyber-hacking toolset that could one day rival that of criminal or state-sponsored hacking. To date attacks have included website defacement, doxing of personally identifiable information, and distributed denial of service (DDoS) attacks. But this could grow to more disruptive attacks, not only with the potential to spread fear, but also raise revenue across the far reaches of the globe.

  • In the early 2000s, the CIA had identified two known U.S.-designated terrorist organizations – Hezbollah and Hamas – with the capability and intent of using cyber attacks against U.S. critical infrastructure. There were also reports of al Qaeda pursuing technically savvy recruits to hold U.S. networks at risk as well. With the emergence of the so-called Islamic State, a global pool of potential recruits that grew up with the internet, and readymade hacking toolsets available online, the likelihood of such groups turning to offensive cyber capabilities is growing.
  • In September 2016, a Kosovo hacker linked to ISIS named Ardit Ferizi was sentenced to 20 years prison for hacking the networks of a U.S. company and stealing personally identifiable information of some 1,300 U.S. military members and government personnel. Ferizi, who pleaded guilty in June 2016, then provided the stolen information to Junaid Hussain, a British hacker and ISIS recruiter also known as Abu Hussain Al Britani, who was later killed in a U.S. drone strike after he published the stolen personal information under the name of the Islamic State Hacking Division (ISHD), now known as the United Cyber Caliphate, on Aug. 11, 2015. Hussain is also thought to be responsible for hacking into U.S. Central Command’s Twitter account.
  • In the dump, Hussain proclaimed, “O Crusaders, as you continue your aggression towards the Islamic State and your bombing campaign against the Muslims, know that we are in your emails and computer systems, watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts, we are extracting confidential data and passing on your personal information to the soldiers of the khilafah, who soon with the permission of Allah will strike at your necks in your own lands! ‘So wait; we too are waiting.”
  • The intention was to package the stolen personal data of U.S. military and government officials – such as names, addresses and other sensitive information – as a ‘kill list’ to inspire lone wolf attacks against those individuals and their families, a clear facilitator fear. In fact, a Bangladeshi living in Maryland named Nelash Mohamed Das was indicted in September 2016 for allegedly seeking to attack a military member whom appeared on the kill list published by Hussain.

Matthew Olsen, Former Director of the National Counterterrorism Center

Keep reading... Show less
Access all of The Cipher Brief’s national security-focused expert insight by becoming a Cipher Brief Subscriber+ Member.

Related Articles

Experts Warn of Insurgents' Paradise in West Africa

Experts Warn of Insurgents' Paradise in West Africa

CIPHER BRIEF REPORTING– A terrorist group with links to Al Qaeda now controls a swath of territory five times the size of Texas, threatens the [...] More

Trump Administration's Counterterrorism Policy Should Begin at Golan Heights

EXPERT PERSPECTIVE / OPINION — We’ve seen all this before, the U.S. mission in Syria is not mission complete – it was not in 2018 – and it’s not done [...] More

Sinwar is Dead. What Does it Mean for Power Dynamics in the Region?

EXPERT Q&A – In what many Cipher Brief Experts are calling one of the most significant events in the year-long war in Gaza, the killing of Hamas [...] More

A Personal Perspective on 9/11 and the War that Followed

CIPHER BRIEF EXPERT PERSPECTIVE – Just before 3:00 p.m. local time just outside the Strait of Hormuz, the Safety Officer aboard the USS ENTERPRISE [...] More

Outgoing NCTC Director Lays Out Today's Very Real Terrorist Threat

EXPERT Q&A — Christine “Christy” Abizaid was sworn in as director of the National Counter-Terrorism Center (NCTC) in June of 2021, as the threat of [...] More

Assassination Attempt on Trump Could Fuel FBI's Biggest Fear: Terrorism

Assassination Attempt on Trump Could Fuel FBI's Biggest Fear: Terrorism

EXPERT Q&A – As the FBI investigates the reasons why 20-year-old suspect Thomas Matthew Crooks may have targeted former president Donald Trump at a [...] More

{{}}