Home Front: WoT |
Pro-Assad Syrian pleads guilty in US to role in hacking |
2016-09-29 |
![]() Pencilneckal-Assad Light of the Alawites... Peter Romar, 37, a refugee who was living in Germany when he was nabbed Drop the rosco, Muggsy, or you're one with the ages! earlier this year, pleaded guilty to charges that spell out a limited role as a member of a so-called Syrian Electronic Army that harassed Harvard University, Human Rights Watch |
Link |
Home Front: WoT |
Syrian national extradited, charged with hacking for Assad |
2016-05-12 |
[ENGLISH.ALARABIYA.NET] A Syrian national extradited to the US made an initial court appearance Tuesday on charges he helped hack and extort American targets perceived to be enemies of Syrian ![]() Pencilneckal-Assad. Horror of Homs... Peter Romar, 36, was extradited from Germany, where he had been living in Waltershausen. A magistrate ordered him held pending a detention hearing Thursday. He is accused of violating Syrian sanctions, conspiring to hack computers and extort money, and other charges. Prosecutors say he joined other hackers from the pro-Assad Syrian Electronic Army who harassed and sought to extort victims including Harvard University and Human Rights Watch ... During the fiscal year ended June 30, 2011, HRW received a pledge from the Foundation to Promote Open Society, of which George Soros is Chairman, for general support totaling $100,000,000. The grant is being paid in installments of $10,000,000 over ten years.Through June 30, 2013, HRW had received $30,000,000 towards the fulfillment of the pledge.... A public defender who had just been appointed to represent Romar after Tuesday’s hearing declined comment. Romar, dressed in a T-shirt and jeans, said little during Tuesday’s hearing. But he asked through an Arabic interpreter to be allowed to call his wife in Germany, whom he said was in a German hospital dying of cancer. A magistrate responded that he was unsure of the ability to place international calls from jail but suggested he speak to his attorney to see what could be facilitated. Two other members of the Syrian Electronic Army -- Firas Dardar and Ahmad Umar Agha, who used the names "the Shadow" and "the Pro," respectively -- also face federal charges and remain on the lam. According to an FBI affidavit, the Syrian Electronic Army in 2011 targeted entities including Harvard University, The Washington Post, the White House, Rooters, Human Rights Watch, National Public Radio, The News Agency that Dare Not be Named, CNN, the Onion, NBC Universal Inc., USA Today, the New York Post, NASA and Microsoft. In April 2013, they allegedly sent a tweet from The News Agency that Dare Not be Named account on Twitter falsely claiming a bomb had went kaboom!at the White House and injured the president. The message caused the stock market to dip significantly before the tweet was quickly determined to be a hoax. The affidavit states that Romar wanted to join the Syrian Electronic Army and reached out to Agha, who put Romar in touch with Dardar. Romar was particularly useful in the conspiracy because his German address made it easier to collect money extorted from various hacking victims, according to the affidavit. |
Link |
Home Front: WoT |
U.S. Army Website Hacked |
2015-06-10 |
[AnNahar] The U.S. Army's official website was hacked Monday with messages denouncing Washington's training of rebel fighters inside Syria, but no data was stolen, officials said. As a result of the hacking, the Army decided to temporarily shut down the website, which is designed for the general public with basic information and does not contain classified or personal data, officials said. "Your commanders admit they are training the people they have sent you to die fighting," said one of the messages. The so-called "Syrian Electronic Army" took credit for the cyber hack, and posted the messages on its Twitter account. The group has been blamed for previous hacking and denial of service attacks that have condemned rebel forces fighting the Syrian regime. "Today an element of the Army.mil service provider's content was compromised," army front man Brigadier General Malcolm Frost said in a statement. "After this came to our attention, the Army took appropriate preventive measures to ensure there was no breach of Army data by taking down the website temporarily." The pro-Syrian regime group has been linked to the hacking of numerous news media sites in recent years, including the Twitter account of Agence La Belle France Presse's photo service. It created confusion in the stock market briefly in 2013 when it put out a fake media tweet falsely claiming the White House was under attack. Officials said it was possibly the first time a U.S. military website had been penetrated, as previous hacking had targeted Twitter accounts. The social media accounts of US Central Command, which oversees American forces in the Middle East, were hacked in January with messages promoting the Islamic State ...formerly ISIS or ISIL, depending on your preference. Before that al-Qaeda in Iraq, as shaped by Abu Musab Zarqawi. They're very devout, committing every atrocity they can find in the Koran and inventing a few more. They fling Allaharound with every other sentence, but to hear the pols talk they're not reallyMoslems.... group. Central Command's Twitter and YouTube accounts were temporarily suspended as a result but no sensitive data was compromised. U.S. officials had called the assault on the CENTCOM Twitter cyber "vandalism." The hack on the Army's website came days after a cyber assault may have compromised the personal information of four million U.S. government workers. U.S. officials and politicians said they suspected China was behind the breach. |
Link |
Terror Networks |
'Honey trap' hackers stole Syria rebel plans |
2015-02-03 |
[Gulf News] Hackers targeted Syrian opposition members with online "honey traps," posing as female supporters to steal battle plans and the identity of defectors, a security firm said on Monday. A report produced by US cybersecurity firm FireEye describes how the hacking operations in late 2013 and early 2014 targeted Syrian opposition fighters, media activists and humanitarian aid workers. The group said it was unclear whether the information had been passed onto the Syrian government, and who the hackers were. But the hacked material included a detailed opposition military plan to recapture the town of Khirbet Ghazaleh, strategically located in southern Daraa province, in 2013. "The hackers stole a cache of critical documents and Skype conversations revealing the Syrian opposition's strategy, tactical battle plans, supply needs, and troves of personal information and chat sessions," the report said. The hacking provided "actionable military intelligence for an immediate battlefield advantage" in the case of the planned Khirbet Ghazaleh attack. It captured "the type of insight that can thwart a vital supply route, reveal a planned ambush and identify and track key individuals." Despite the high-tech tools used in the attack, the hackers also relied on a well-worn tactic: the "honey trap." Targets were contacted on the chat and online phone service Skype by hackers posing as pro-opposition women. They would ask the target whether they were on a smartphone or computer, apparently in a bid to tailor their attacks. Then the hackers would send the target a photo of themselves loaded with malware that penetrated their personal files and stole information. The method was particularly fruitful because Syrian opposition members were often sharing computers, meaning one machine yielded information from multiple victims. Most of the data stolen was created between May 2013 and December 2013, but some of the stolen Skype chat logs went back to 2012 and others included information from as recently as January 2014. The hackers also used other tactics, including creating fake social media accounts and Syrian opposition websites that encouraged visitors to click on links that would infect their computers. In May 2013, regime troops stormed Khirbet Ghazaleh which was rebel-held at the time and being used to block the highway between Damascus and Daraa. The report was unable to identify where the hackers were based, or who they might have reported to. But it noted that the hackers' servers were based outside of Syria and they used tools and tactics that were different from other Syrian hackers. Syria's conflict has involved other documented cases of cyberwarfare, by both pro-regime and opposition activists. Some of the most high-profile include attacks by the so-called Syrian Electronic Army, a group of pro-government hackers who have attacked websites and social media accounts belonging to media outlets and politicians. |
Link |
Israel-Palestine-Jordan |
Cyber assaults ever more severe, says IDF officer |
2015-01-14 |
[IsraelTimes] The commander of the IDF Cyber Defense Unit, speaking shortly before IS hacked into CENTCOMs twitter account, warns of far more significant attacks in future wars The Israeli army is battling cyber attacks of increasing complexity, edging closer to an age in which online attacks become a central component of asymmetric warfare, the head of the IDFs cyber defense unit told The Times of Israel recently. The danger to the military, which has stored all of its information on computers for the past 35 years and is increasingly run online, was underscored on Monday when hackers identifying with the Islamic State ...formerly ISIS or ISIL, depending on your preference. Before that al-Qaeda in Iraq, as shaped by Abu Musab Zarqawi. They're very devout, committing every atrocity they can find in the Koran and inventing a few more. They fling Allaharound with every other sentence, but to hear the pols talk they're not reallyMoslems.... terror group managed to hijack social media accounts of the US Militarys Central Command, posting propaganda and what it claimed was secret information. For Israel, though the principle threats come from Hamas, always the voice of sweet reason,, Hezbollah, and Iran, which invest heavily in cyber warfare and their capacities continue to improve, said the IDF cyber units commander, who spoke on condition of anonymity. The unit, which graduated a new class of so-called cyber defenders last week, was founded two years ago. During Operation Protective Edge in Gazoo this summer, Israel was subjected to a wide-scale attack the likes of which we have not before seen, a commander in the armys computers and technology branch, known as C4I, told a group of Israeli military news hounds. Iran, he added, had put very significant effort into the offensive. The bulk of the threats, as is the case with terror, were aimed at civilian systems rather than the more heavily protected military systems, the officer said. The armys operational systems, very much reliant on technology, were not attacked. The sole high profile success was the Iranian-backed, so-called Syrian Electronic Armys hacking of the IDF Spokespersons English Twitter feed on July 3. #Warning: possible nuclear leak in the region as two rockets hit Dimona nuclear facility, the feed read until it was corrected several minutes later. Nonetheless, some of those who closely followed the advance of the cyber threat in recent years and specifically during the operation saw a notable shift in the Iranian approach. Its quite possible that the Iranian progress in the cyber sphere during Operation Protective Edge is evidence of the beginning of a process in which cyber war replaces the classic terror as a central tool in Irans doctrine of asymmetric warfare, Col. (ret) Gabi Siboni, the director of the Cyber Security Program at the Institute for National Security Studies think tank in Tel Aviv, wrote shortly after the operation. Cyber attacks would enable Israels enemies to strike the home front and are often easily deniable two elements that are central to the Iranian approach to asymmetric warfare against Israel, Siboni wrote. Iran, he added, is quickly and adroitly bridging the gap in cyber technology between itself and Israel. We dont need to be naive, the unit commander said. Its simple the axis of Islamist resistance is constantly probing for chinks in the IDFs armor; hence the rise of the rocket and missile threat. As that threat has been partially thwarted, he said, the tunnel threat, a dominant feature of the Gazoo war, was pushed to the fore. In the coming wars, he said, especially those in the north, I imagine that the cyber capacity will be far more significant than in the past wars The possibility of a 1973 Yom Kippur-like scenario, in which cyber threats, disguised as something more benign, are suddenly released, in unison, is one Israel cannot afford to dismiss. Massive cyber attacks, like the Egyptian onslaught on Yom Kippur are feasible, he said. But the units very, very wide intelligence picture, coupled with a dynamic defensive system, keeps us two steps ahead of the known assault level. The armys defensive posture, in cyber space, he said, is akin to that along Israels borders. There are visible barriers, erected in cyber space. They are meant, like border fences, to provide one layer of protection. Around them are other obstacles meant to guide an intruder toward central channels of attack, which are studded with covert traps. He described the net around Israels secrets and computerized weapons systems as deeply layered and said that in a very, very high percentage of cases the army is able to locate the point of attack and either stymie its advance or launch a counter-strike. Its no different than the kinetic world of war on land, he said. However, today is that tomorrow you were thinking about yesterday... potential attackers can come from anywhere in the world, not just enemy states, and need no special infrastructure in order to succeed. A nation seeking to advance its intercontinental missile capacity needs a planning infrastructure, a support network, and a lot of money, the head of C4I, Maj. Gen. Uzi Moskovitz, noted last year in a public address. In cyber space, though, one can climb from seventh or eighth in the world to second or third easily. There is virtually no dependence on physical factors; the only necessity is human capital. The IDFs Cyber Defense Unit, which last week graduated a small group of soldiers to the pool of several hundred currently in service, seek highly curious people, with the ability to work in a team, learn new material fast, and the tenacity to never leave a stone unturned, the unit commander said. Once we have that, we can give a short course and they will be able to attain a very wide knowledge. He described the nature of the work as sifting through many piles of noise and fishing out that which seems suspicious, and then linking it to other suspicious events, inspecting them, developing a three-dimensional picture, compiling the evidence into a diagnosis and then investigating the threat thoroughly enough so as to render it transparent. For now, this unit has proven demonstrably successful. But there is no guarantee this superiority will endure, particularly in light of the disorder among the many bodies addressing the cyber threat, including the IDF, the Shin Bet, the Mossad, communications companies and providers, the Bank of Israel and the Israel Police. The absence of order in Israels defensive cyber deployment, Saboni wrote, may cause holes in the digital Iron Dome shielding Israel and allow hostile elements to harm Israel. The commander of the most recent cyber defense course, cleared to speak only as Lt. S., noted the growing threats against Israel and the growing reliance on technology within the army. The cyber threat level is always going up, he said, but, on the other hand, were not going to go back (in time) and start working with paper. |
Link |
Israel-Palestine-Jordan |
IDF Twitter account hacked, posts false warning of nuclear leak |
2014-07-04 |
[Ynet] 'There's a possibility of nuclear leak in the area after two rockets hit the Dimona nuclear reactor,' hackers post on IDF Spokesman's English Twitter account. The IDF Spokesman's English Twitter account scared its 250,000 followers on Thursday when it tweeted: "There's a possibility of nuclear leak in the area after two rockets hit the Dimona nuclear reactor." But it soon turned out the account has been hacked. "We apologize for the incorrect tweets," the IDF Spokesman's Office wrote after deleting the misleading message. "Our twitter account was compromised. We will combat terror on all fronts including the cyber dimension." The Syrian Electronic Army grabbed credit for the hacking, posting a screenshot on its Twitter page to prove it. |
Link |
Syria-Lebanon-Iran |
Syrian Electronic Army Hacks Skype |
2014-01-05 |
[FinancialTimes] Skype, the internet calls service owned by Microsoft ...producers of Windows, Office, and the late Microsoft Bob, contributed $852,167 to the 2008 Obama campaign... , was hacked by cyber criminals claiming to be supporters of Syrian ![]() Pencilneckal-Assad Lord of the Baath... on New Year's day, with anti-surveillance messages posted on its social media sites and blog. The attack appears to be the first time a company that is alleged to have been involved in the US National Security Agency's surveillance programme has been targeted by the hackers. The cyber criminals wrote "hacked by the Syrian Electronic Army . . . Stop Spying!" on a Skype blog page and used Skype's Twitter account to tell the Federal Bureau of Investigation to "stop spying on people". On the company's Facebook page, the hackers told people not to use Microsoft's email services such as Outlook and Hotmail, claiming "they are monitoring your accounts and selling it to governments". The Syrian Electronic Army, a group of hackers that supports the Syrian president in the country's civil war, repeated the same messages from its own Twitter account. "We recently became aware of a targeted cyber attack that led to access to Skype's social media properties, but these credentials were quickly reset. No user information was compromised," a Skype spokesperson said. |
Link |
Home Front: WoT | |
Syrian Electronic Army hacks TIME magazine over Assad | |
2013-11-30 | |
The SEA has tweeted from TIME's official account: "Syrian Electronic Army was here via @Official_SEA16. Next time write a better word about the Syrian president #SEA". That tweet was soon deleted. The group referred to TIME's list of people -- politicians and celebrities -- selected as potential winners for "Person of the Year," the magazine's annual award. Syrian ![]() Pencilneckal-Assad Light of the Alawites... is one of the candidates, while the magazine describes him as: "Syria's ruler presided over a bloody year, shrugging off international concerns over the use of chemical weapons as the corpse count of his country's civil war eclipsed 100,000." The voting closes on December, 4, with TIME's Person of the Year to be announced on December 11. The SEA also claimed interfering with the vote on the US magazine's webpage. TIME is not the first target of the notorious hacktivist group. The SEA, a group of hackers sympathetic to the government of Syrian President Bashir al-Assad, also grabbed credit for cyber-attacks on The New York Times ...which still proudly displays Walter Duranty's Pulitzer prize... , The Washington Post, The Huffington Post and Thomson Rooters. In April, they also compromised the main Twitter account for the News Agency that Dare Not be Named. As a result of the online attack, the News Agency that Dare Not be Named -- one of the most trusted sources for journalists -- falsely reported that US President B.O. had been injured in a surprise attack on the White House, causing a brief panic online and even causing the stock market to fall by over 150 points. The SEA also defaced a US Marine Corps recruitment website on September 2, posting images of US soldiers holding messages of contempt regarding possible American involvement in Syria. Following that attack, the Federal Bureau of Investigation added the SEA to its list of wanted criminals. "The Syrian Electronic army, a pro-regime hacker group that emerged during Syrian anti-government protests in 2011, has been compromising high-profile media outlets in an effort to spread pro-regime propaganda," the FBI advisory stated. "The SEA's primary capabilities include spearphishing, web defacements, and hijacking social media accounts to spread propaganda." | |
Link |
Home Front: WoT |
Links Used In Obama Twitter Account Hacked |
2013-10-29 |
[Ynet] A nonprofit political advocacy group which emanated from President Barack ObamaI've now been in 57 states -- I think one left to go... 's re-election campaign says hackers altered the links contained in tweets sent under his name. A group called the Syrian Electronic Army grabbed credit for the action. The group aligns itself with Syrian ![]() Pencilneckal-Assad Horror of Homs... and has taken credit for hacking into social media sites in the past. The group said, quote, "Obama doesn't have any ethical issues with spying on the world, so we took it upon ourselves to return the favor." |
Link |
Arabia |
Qatar recovers websites from pro-Assad Syria hackers |
2013-10-21 |
[Al Ahram] Qatari authorities have restored several government websites attacked by hackers from the Syrian Electronic Army, who support ![]() Pencilneckal-Assad's Light of the Alawites... regime, local media reported Sunday. Qatar's Supreme Council of Information and Technology (ictQatar) said in a statement carried by local media that it has "recovered all government websites hacked on Saturday." It said it is ready to "deal with any similar future operations." "No financial losses have been caused" by the hacking that targeted websites with the "gov.qa" domain name, local media quoted ictQatar as saying on Twitter. The Qatari interior ministry's page was among the websites hit. But the ministry said on Twitter that "data registered on the website was not affected." Hackers who claim to support Assad, collectively known as the Syrian Electronic Army, have targeted high-profile websites in recent months, including one belonging to the US marines and the New York Times ...which still proudly displays Walter Duranty's Pulitzer prize... 's page. |
Link |
Home Front: WoT | |||
Pro-Syria hackers put anti-attack message on US Marines site | |||
2013-09-03 | |||
![]() Pencilneckal-Assad Before going into the family business Pencilneck was an eye doctor. If he'd stuck with it he'd have had a good practice by now... struck an Internet recruiting site for the US Marine Corps on Monday, urging troops to "refuse your orders" if the United States attacks Syria. The attack appeared to be the work of the Syrian Electronic Army, which also recently targeted the New York Times ...which still proudly displays Walter Duranty's Pulitzer prize... ' website and Twitter. The hackers posted a message and images on the website www.marines.com, signing it "delivered by SEA," a reference to the Syrian Electronic Army. A Defense Department front man said the site, on commercial network rather than the Defense Department network, had been restored after an outage of a few hours. The seven-sentence "Message to the United States Marine Corps," said the Syrian Army "should be your ally, not your enemy" against "a vile common enemy" of terrorism.
| |||
Link |
Syria-Lebanon-Iran | |
Syria, Iran prep cyberwar response to U.S. | |
2013-08-30 | |
Syria and its ally Iran have been building cyberattack capabilities for years and soon might have a chance to use their skills in a hot war for the first time.
Its foreseeable that [Syrian] state-sponsored or state-sympathetic hackers could seek to retaliate against U.S., Israeli or Western interests, Michael Chertoff, a former secretary of Homeland Security, told The Washington Times on Wednesday. We have already seen regional cyberactors, such as the Syrian Electronic Army, conduct attacks on U.S. targets, added Rep. James R. Langevin, Rhode Island Democrat and a member of the House Armed Services Committee and the Permanent Select Committee on Intelligence. The Syrian Electronic Army has successfully attacked computer networks used by U.S. media outlets hacking the Twitter account of The Associated Press this year and mostly knocking The New York Times website offline for 20 hours Tuesday and Wednesday. Attackers penetrated the company that manages the papers Internet domain, NYTimes.com, according to reports in the computer security trade press. Hackers can relatively easily hide their tracks from all but the most extensive and time-consuming forensic efforts, but the Syrian Electronic Army has publicly claimed these attacks. In online postings, the group of hacker activists, or hacktivists, claim to be motivated by Syrian patriotism and to act independently of the regime in Damascus. It can be difficult to distinguish between hackers who are sympathetic to a regime and those directly [state] sponsored or controlled, said Mr. Chertoff, co-founder and chairman of the Chertoff Group, a global security advisory firm. Islamic hackers whom U.S. officials have linked to Iran have launched a series of increasingly powerful cyberattacks against the websites of major U.S. banks for almost a year. Large U.S. financial institutions probably have the best cybersecurity of any nongovernmental entity, yet their websites have been driven offline by repeated attacks. A self-described hacktivist group called Izad din al Qassam has claimed responsibility for the attacks, which they announce in advance. The group says the attacks are designed to punish the United States for an Internet video, Innocence of Muslims, made by an Egyptian-American Coptic Christian, which portrays Islams Prophet Muhammad as a killer and pedophile. The Obama administration tried to blame the video for the terrorist attack last year at a U.S. diplomatic compound in Libya that killed Ambassador J. Christopher Stevens and three other Americans. But the kind of cyberattack that most alarms national security specialists took place a year ago and was aimed at the Saudi Arabian state oil company, Aramco. A virus called Shamoon infected the companys computer network and wiped data from more than 30,000 computers, effectively destroying all the information on the system. A similar attack on a bank could destroy digital records of customer accounts. | |
Link |