Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ISIS Cyber Threat To US Under Debate
Newest First  |  Oldest First  |  Threaded View
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/24/2014 | 4:22:00 PM
Re: The unmeasurable threat
It's  difficult to predict what cybercrimes a westerner would be recruited to  perform for ISIS, though we know for sure that some of it is creating web videos and dissiminating them via social media. What's harder to understand is the process that turns an individual into a jihadist who carries out horrific acts.  There has been a lot of ink spilled about the Boston marathon bombers  -- and maybe we will get a better sense after the trial of  Dzhokhar Tsarnaev. But now I'm as clueless as ever about how and why these things happen.
User Rank: Ninja
9/24/2014 | 3:39:21 PM
Re: The unmeasurable threat
It has yet to be determined what ISIS would want from the cyber-community other than support.  I am sure they would accept any help for their cause as long as it causes problems for their enemies.

When it comes to hacktivism it may not be that ISIS is good at recruiting as much as other misguided souls decide that the defiance that ISIS has toward western developed countries is in line with their ideologies and/or goals.  What is difficult to predict is what activities or information may fan the fires of dissent and cause such people to act in the name of or in league with ISIS.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
9/24/2014 | 1:17:34 PM
Tapping cables won't necessarily catch an insider threat/pilfered credentials of an authorized insider.
User Rank: Ninja
9/24/2014 | 1:04:52 PM
It's a little surprising that the US is worried about potential ISIS security threats. It's previously made claims that the PRISM scheme and other NSA snooping measures are in place to prevent terrorism, be it real world or digital.

Of course we know that that isn't necessarily the case, but surely with that sort of comprehensive tracking system in place, any sort of attack could be instantly spotted and tracked to its source? Otherwise what's the point of tapping into cables and suffering through all the public outcry? 
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
9/24/2014 | 11:47:17 AM
Re: The unmeasurable threat
One thing I didn't go into in my story that I've been thinking about and talking to experts about is how ISIS uses social media to recruit and reach out, and how that could be an avenue for recruiting DDoS participants, kind of how Anonymous did in its hacktivist campaigns. It was easy for Anon to get LOIC recruits for DDoS attacks, so it makes you wonder if the same would be true for ISIS or another terror group to do via social media. Then again, the question is whether DDoS really fits ISIS's MO.
User Rank: Ninja
9/24/2014 | 8:37:50 AM
The unmeasurable threat
As real as the ISIS threat is, there is another real threat that is hard to measure and predict until it happens.

Hacktivism is a relatively new threat on the cyberwar landscape.  There are citizens of other countries that may find reason to support the ISIS cause OR fall into that "the enemy of my enemy" mentality.  Depending on how well the ISIS campaign is conducted, this threat may be nothing, or it may boil into a completely different and unexpected cyber campaign.
User Rank: Ninja
9/24/2014 | 2:11:55 AM
ISIS is a concrete cyber threat
I have no doubts, the ISIS is a concrete cyber threat and has the necessary skills and capabilities to conduct a major cyber attack against Western critical infrastructure.

ISIS members have the real perception of the effects of a cyber attacks and how to conduct it. We must be prepared and evaluate carefully the real security level of our infrastructure, unfortunately many security researchers have demonstrated over the years that is too easy to locate over the internet a vulnerable system and exploit it in a cyber offensive.

Consider also that we are approaching cyber warfare matter, the conflicts are instantaneous in nature and asymmetric, impossible to predict and with objective difficulties for related attribution.

Never let the guard down ... the enemy is ready!

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2022-12-01
IXPdata EasyInstall 6.6.14725 contains an access control issue.
PUBLISHED: 2022-12-01
Telenia Software s.r.l TVox before v22.0.17 was discovered to contain a remote code execution (RCE) vulnerability in the component action_export_control.php.
PUBLISHED: 2022-12-01
In GL.iNet Goodcloud 1.1 Incorrect access control allows a remote attacker to access/change devices' settings.
PUBLISHED: 2022-12-01
In GL.iNet Goodcloud 1.0, insecure design allows remote attacker to access devices' admin panel.
PUBLISHED: 2022-12-01
An improper privilege management vulnerability was identified in GitHub Enterprise Server that allowed users with improper privileges to create or delete pages via the API. To exploit this vulnerability, an attacker would need to be added to an organization's repo with write permissions. This vulner...