Английская Википедия:Islamic State Hacking Division

Материал из Онлайн справочника
Перейти к навигацииПерейти к поиску

Шаблон:Notability Шаблон:Infobox militant organization The Islamic State Hacking Division (ISHD) or The United Cyber Caliphate (UCC) is a merger of several hacker groups self-identifying as the digital army for the Islamic State of Iraq and Levant (ISIS/ISIL). The unified organization comprises at least four distinct groups, including the Ghost Caliphate Section, Sons Caliphate Army (SCA), Caliphate Cyber Army (CCA), and the Kalashnikov E-Security Team. Other groups potentially involved with the United Cyber Caliphate are the Pro-ISIS Media group Rabitat Al-Ansar (League of Supporters) and the Islamic Cyber Army (ICA).[1] Evidence does not support the direct involvement of the Islamic State leadership. It suggests external and independent coordination of Pro-ISIS cyber campaigns under the United Cyber Caliphate (UCC) name.[2] Investigations also display alleged links to Russian Intelligence group, APT28, using the name as a guise to wage war against western nations.[3][4]

Concerns

The group's actions have included online recruiting, website defacement, social media hacks, denial-of-service attacks, and doxing with 'kill lists.'[5][6][7] The group is classified as low-threat and inexperienced because their history of attacks requires a low level of sophistication and rely on publicly available hacking tools.[8][9]

Experts raised doubts about the source and nature of data from released 'kill lists' containing personal information about U.S. Military personnel claimed stolen from hacked U.S. government servers. There is no evidence that the United Cyber Caliphate (UCC) compromised U.S. systems. The data included public, unclassified, and often outdated information about civilians, non-U.S. citizens, and others built from old data breaches or web scraped data.[10][11]

U.S., French, and German intelligence Investigated attacks following the French Television Channel TV5Monde hack and The U.S. CENTCOM Twitter attack. All three countries linked actions by the United Cyber Caliphate (UCC) to APT 28 (aka Fancy Bear), a Russian intelligence group.[3][4]

History

The group first emerged in hacking operations against U.S. websites in January 2015 as the Cyber Caliphate Army (CCA).[1] In March 2015, the Islamic State published a "kill list" on a website that included names, ranks, and addresses of 100 U.S. military members.[12]

A pattern of similar attacks emerged after the media coverage. At least 19 individual 'kill lists,' including personal information of American, Canadian, and European citizens released between March 2015 and June 2016.[13] On April 4, 2016, all four groups united as the United Cyber Caliphate (UCC).[14]

In June 2016, the Middle East Media Research Institute found and revealed to the media an alleged list of approximately 8,300 people around the world as potential lone-wolf attack targets.[15]

Successful attacks since mid-2014

  • Website belonging to the Hobart Airport was defaced.[16][17]
  • French TV5Monde live feed hacked, social media hacked and defaced with the message "Je Suis ISIS".[18] French investigators later discounted this, instead suspecting the involvement of a hacking group, APT28, allegedly linked to the Russian government.[19]
  • ISIS hacks Swedish radio station and broadcasts recruitment song [20]
  • United States' military database hacked in early August and data pertaining to approximately 1400 personnel posted online.[21]
  • Top secret British government emails hacked. The emails pertained to top cabinet ministers. The intrusion was detected by GCHQ.[22]
  • February 28, 2016, Caliphate Cyber Army (CCA) carried out a cyber attack on the website of Solar UK, a company in the town of Battle, England. Customers were being redirected to a web page featuring the ISIS logo accompanied by a string of threats. “Fear us,” the page stated. “We are the Islamic Cyber Army”.[23][24]
  • On April 15, 2016 (Friday), Islamic State hackers under the name UCC successfully hacked 20 Australian websites in a coordinated attack on Australian business. Some of the websites redirected to the website containing their content.[25]
  • In early April 2017, UCC released a kill list of 8,786 people.[26]
  • In mid 2019, Islamic State affiliated hacking group hijacked 150 targeted Twitter handles using an unknown vulnerability.[27]

References

Шаблон:Reflist