Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ISIS Cyber Threat To US Under Debate
Threaded  |  Newest First  |  Oldest First
User Rank: Ninja
9/24/2014 | 2:11:55 AM
ISIS is a concrete cyber threat
I have no doubts, the ISIS is a concrete cyber threat and has the necessary skills and capabilities to conduct a major cyber attack against Western critical infrastructure.

ISIS members have the real perception of the effects of a cyber attacks and how to conduct it. We must be prepared and evaluate carefully the real security level of our infrastructure, unfortunately many security researchers have demonstrated over the years that is too easy to locate over the internet a vulnerable system and exploit it in a cyber offensive.

Consider also that we are approaching cyber warfare matter, the conflicts are instantaneous in nature and asymmetric, impossible to predict and with objective difficulties for related attribution.

Never let the guard down ... the enemy is ready!
User Rank: Ninja
9/24/2014 | 8:37:50 AM
The unmeasurable threat
As real as the ISIS threat is, there is another real threat that is hard to measure and predict until it happens.

Hacktivism is a relatively new threat on the cyberwar landscape.  There are citizens of other countries that may find reason to support the ISIS cause OR fall into that "the enemy of my enemy" mentality.  Depending on how well the ISIS campaign is conducted, this threat may be nothing, or it may boil into a completely different and unexpected cyber campaign.
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
9/24/2014 | 11:47:17 AM
Re: The unmeasurable threat
One thing I didn't go into in my story that I've been thinking about and talking to experts about is how ISIS uses social media to recruit and reach out, and how that could be an avenue for recruiting DDoS participants, kind of how Anonymous did in its hacktivist campaigns. It was easy for Anon to get LOIC recruits for DDoS attacks, so it makes you wonder if the same would be true for ISIS or another terror group to do via social media. Then again, the question is whether DDoS really fits ISIS's MO.
User Rank: Ninja
9/24/2014 | 3:39:21 PM
Re: The unmeasurable threat
It has yet to be determined what ISIS would want from the cyber-community other than support.  I am sure they would accept any help for their cause as long as it causes problems for their enemies.

When it comes to hacktivism it may not be that ISIS is good at recruiting as much as other misguided souls decide that the defiance that ISIS has toward western developed countries is in line with their ideologies and/or goals.  What is difficult to predict is what activities or information may fan the fires of dissent and cause such people to act in the name of or in league with ISIS.
Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
9/24/2014 | 4:22:00 PM
Re: The unmeasurable threat
It's  difficult to predict what cybercrimes a westerner would be recruited to  perform for ISIS, though we know for sure that some of it is creating web videos and dissiminating them via social media. What's harder to understand is the process that turns an individual into a jihadist who carries out horrific acts.  There has been a lot of ink spilled about the Boston marathon bombers  -- and maybe we will get a better sense after the trial of  Dzhokhar Tsarnaev. But now I'm as clueless as ever about how and why these things happen.
User Rank: Ninja
9/24/2014 | 1:04:52 PM
It's a little surprising that the US is worried about potential ISIS security threats. It's previously made claims that the PRISM scheme and other NSA snooping measures are in place to prevent terrorism, be it real world or digital.

Of course we know that that isn't necessarily the case, but surely with that sort of comprehensive tracking system in place, any sort of attack could be instantly spotted and tracked to its source? Otherwise what's the point of tapping into cables and suffering through all the public outcry? 
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
9/24/2014 | 1:17:34 PM
Tapping cables won't necessarily catch an insider threat/pilfered credentials of an authorized insider.

I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use URL decoding to retrieve system files, credentials, and bypass authentication resulting in privilege escalation.
PUBLISHED: 2023-03-27
In Delta Electronics InfraSuite Device Master versions prior to 1.0.5, an attacker could use Lua scripts, which could allow an attacker to remotely execute arbitrary code.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 contains an improper access control vulnerability in which an attacker can use the Device-Gateway service and bypass authorization, which could result in privilege escalation.
PUBLISHED: 2023-03-27
Delta Electronics InfraSuite Device Master versions prior to 1.0.5 are affected by a deserialization vulnerability targeting the Device-DataCollect service, which could allow deserialization of requests prior to authentication, resulting in remote code execution.
PUBLISHED: 2023-03-27
Heap-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.4.0.