First Hacker Arrested for CyberTerror Charges Arrives In American CourtFirst Hacker Arrested for CyberTerror Charges Arrives In American Court
Kosovo citizen faces a maximum sentence of 35 years in prison for hacking and providing material support to ISIS.
February 2, 2016
Kosovo citizen Ardit Ferizi, 20, AKA "Th3Dir3ctorY," made his first appearance before a judge in the Eastern District of Virginia Wednesday after being arrested in Malaysia in October for hacking, identity theft, and providing material support to a terrorist organization.
It is the first true cyber-terror case being tried. If convicted, Ferizi faces a sentence of up to 35 years in prison.
The criminal complaint states that Ferizi passed stolen data to members of the Islamic State of Iraq and the Levant (ISIL, more commonly known as ISIS) on two separate occasions -- once to Tariq Hamayun, AKA Abu Muslim Al-Britani, and once to Junaid Hussain, AKA Abu Hussain Al-Britani, a "British hacker and well-known member of ISIL," according to DoJ.
The charges state Ferizi compromised an unnamed victim organization, stealing data on roughly 100,000 individuals -- including names, email addresses, email passwords, physical locations, and phone numbers for approximately 1,350 U.S. government and military personnel. Ferizi sent the files to himself via Facebook, then passed it to Hussain. Hussain then took the identity and location data of the government personnel on Twitter with a message with the intent of "encouraging terrorist attacks against the affected individuals." The earlier attack appeared to be for stealing PII and credit card data.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
The Rise of Extended Detection & Response