TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5



Similar documents
Cyber Terrorism and Australia s Terrorism Insurance Scheme. Physically Destructive Cyber Terrorism as a Gap in Current Insurance Coverage

Manifesto for Education Empowering Educators and Schools

10 Things Every Web Application Firewall Should Provide Share this ebook

What legal aspects are needed to address specific ICT related issues?

Assessment of the terror threat to Denmark

AppWall SIEM Integration Guide

Version Highlights. CertainT 100 SSL Accelerator. Version International. New hardware and software version. North America

Tech Report. Targeted attack on. France s TV5Monde

TLP WHITE. Denial of service attacks: what you need to know

Cyber Security Assessment Netherlands csan 2015

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Assessment of the Terror Threat to Denmark

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

(U) Law Enforcement at Risk for Harassment and Identity Theft through Doxing

Introduction. Special Conference. The Exploitation Of Media By Terrorist Groups

Radware Emergency Response Team. SSDP DDoS Attack Mitigation

SocioBrains. Cyber security threat in Pakistan: causes Challenges and way forward

ACE European Risk Briefing 2012

Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide

Protecting critical infrastructure from Cyber-attack

The Mesada Special Education School in Tel Aviv, Israel

Current Threat to the U.S. from Cyber Espionage & Cyberterrorism

Hacker Intelligence Initiative, Monthly Trend Report #5

Arab-Israeli Conflict

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Radware s Multi-homing Solutions

ARAB-ISRAELI CONFLICT

Surviving the Era of Hack Attacks Cyber Security on a Global Scale

SPEECH. Visit for more news and information about MINDEF and the SAF

NATO & Cyber Conflict: Background & Challenges

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

Developing a robust cyber security governance framework 16 April 2015

DDoS Attack and Its Defense

SHARE THIS WHITEPAPER

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Internet and Cyber Terrorism

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

How to Evaluate DDoS Mitigation Providers:

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

Law Enforcement Assessment of the Violent Extremism Threat. Charles Kurzman and David Schanzer June 25, 2015

How To Protect A Dns Authority Server From A Flood Attack

Friend of a Friend Influence in Terrorist Social Networks

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

Data Centers Protection from DoS attacks. Trends and solutions. Michael Soukonnik, Radware Ltd Riga. Baltic IT&T

Customer Cases. Andreas Nordenadler, Sales Manager

Top 5 Data Breaches in 2014

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

LinkProof And VPN Load Balancing

INTELLIGENCE ASSESSMENT

How To Understand Cyber Security

Network Test Solutions. RADCOMmendation How to Test End-to-end IP-PBX Quality with RADCOM s QPro?

Content Inspection Director

Who s Doing the Hacking?

Research Note Engaging in Cyber Warfare

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

What is Cyber Liability

Energy Cybersecurity Regulatory Brief

Cyber Security for Start-ups: An Affordable 10-Step Plan

Government Surveillance, Hacking, and Network Security: What Can and Should Carriers Do? Kent Bressie PITA AGM, Tonga April 2015

The use of mosques in the Gaza Strip for military purposes by Hamas and other terrorist organizations: the case of the Al-Farouq Mosque

RESPONSE TO THE GOVERNMENT REVIEW OF THE MUSLIM BROTHERHOOD 22 DECEMBER 2015

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

Cyber Terrorism and Information Security Brett Pladna East Carolina University

7 Cs of WEB design - Customer Interface

Testimony of. Mark Shlanta. Chief Executive Officer. SDN Communications. Confronting the Challenge of Cybersecurity. before the

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International.

How do we Police Cyber Crime?

Transcription:

January 2015

TABLE OF CONTENTS INTRODUCTION...3 ANONYMOUS...3 ANONGHOST...4 SUMMARY...5

Introduction On January 7, 2015 France endured a three day terror attack. In the aftermath, two separate parties launched a series of cyber-attacks. First, Anonymous declared war on Islamic extremists and promised to seek revenge for the attack on French satirical magazine Charlie Hebdo. Second, the Islamic hacker s team AnonGhost declared cyber war on France, citing their unhappiness with the French population and its reaction to these attacks. Read this alert to understand the threats and plans of each organization. Anonymous Hacktivist group Anonymous vowed to attack terrorist websites and social media accounts in revenge for the killing of Charlie Hebdo journalists. In a recent video posted on YouTube, Anonymous announced it would track down any website and social media network linked to terrorists in an operation called #OpCharlieHebdo."We intend to take revenge in their name, we are going to survey your activities on the net, and we are going to shut down your accounts on all social networks." Anonymous hacked websites belonging to government departments, companies and other organizations, as well as a jihadist website. Furthermore, a Twitter account known as @OpCharlieHebdo, created on the first day of the attack, asked followers to report Twitter accounts of suspected terrorists. A crowd sourced list shared by the group has collected more than 100 accounts to target via Twitter. The operation is expected to start on or about January 15. The hackers associated with the international network took responsibility for bringing down Ansar- Alhaqq.net, a religious website in French and Arabic that waves an Islamic flag, with a distributed denial of-service (DDoS) attack.

AnonGhost Islamic hackers called AnonGhost have launched a digital jihad against France and Anonymous. Over the last few days, AnonGhost has brought down a number of French websites, replacing the pages with a manifesto and a series of disturbing images. Several websites in a number of towns in the outskirts of Paris have been hacked and covered with an image of an ISIS flag. The front pages of the official municipality websites have been covered with the Jihadist militant group's black flag, play Arabic-language music and feature the message: "The Islamic State Stay Inchallah, Free Palestine, Death to France, Death to Charlie." Some of the sites that have been taken over include those of the towns of Jouy-le-Moutier, Piscop, Goussainville, Val D'Oise and Ezanville. All of them are situated around the French capital. The AnonGhost states that hackers will attack French domains because AnonGhost strongly believes that France has been attacking the Islamic religion and ethics for too long. Since AnonGhost launched #OPFrance it has targeted a telecom company, bank, and media firm and claimed to have crippled 100 websites during its assaults.

Summary and Recommendations Threat Scope The following websites and internet services are under threat: Organizations associated with France, particularly government related businesses Islamic and pro-islamic organizations Organizations that may be perceived as anti-islamic Possible Threats DDoS, website defacement, information theft, and more Required Actions Target organizations are required stay on high alert and monitor the website and network for any suspicious activity. Radware s ERT will continue to closely track these threats and provide updates on any additional steps required. Radware Customers In the event of an attack, please contact Radware support at support@radware.com. North America International Radware Inc. Radware Ltd. 575 Corporate Drive 22 Raoul Wallenberg St. Mahwah, NJ 07430 Tel Aviv 69710, Israel Tel: +1-888-234-5763 Tel: 972 3 766 8666

2015 Radware, Ltd. All Rights Reserved. Radware and all other Radware product and service names are registered trademarks of Radware in the U.S. and other countries. All other trademarks and names are the property of their respective owners. Printed in the U.S.A