Go homepage(回首页)
Upload pictures (上传图片)
Write articles (发文字帖)

The author:(作者)
published in(发表于) 2016/6/18 12:51:13
Secret terrorist organization IS hacking team: United Kingdom juvenile growth of revenge in mind,

English

中文

Secret terrorist organization IS hacking team: United Kingdom revenge of the juvenile growth record-hacker, terrorist organizations-IT information

On June 17, according to technology Insider Web site reported, United States former commando members in North Carolina Nike·paermixiyanuo (Nick Palmisciano), FBI agent, it seems, have become commonplace. The company he created to do army clothing business, FBI will sometimes come to him who knows is under security investigation information. But 1 year ago, when the FBI appears again in his Office, appears to be completely different.

Paermixiyanuo said: "the FBI intercepted some information, which refers to my name and address, obviously I was listed as a high-value target. "Paermixiyanuo under hacker organization by terrorist organizations IS included in the" hit list "list for military personnel, Government employees and civilians. The hackers and their supporters sometimes changed the face of modern warfare.

United States Marine Corps veteran, network security consulting firm founder and CEO of TrustedSec Dawei·kennidi (David Kennedy) said: "IS is the first hacker branch of a terrorist organization. In a sense, some hackers have also helped Al-Qaida, but IS really a hack of power. ”

In occupied Iraq and Syria after large areas of the territory, IS in 2014, declares its independence, and Syria city of raqqa for "capital". In many armed members proudly display IS captured on the battlefield when all kinds of heavy weapons, a new "Islamic State" started having "soft skills" of talent.

United States Defense Ministry former cybercrime investigator jimu·kelisidi (Jim Christy) said: "Al-Qaida and IS the Organization's acting styles completely different. Al-Qaida use of technology to protect themselves, and IS using it for advocacy and attack. "Al-Qaeda organization has its own Web site, even as terrorists released a special encryption software, but it almost never launch network attacks. While the IS organization uses laptops and Internet launched the "beyond the border attacks", including the invasion sites, takes over Twitter accounts, distribute promotional materials.

Despite the more than more than 30,000 foreign fighters helping fight IS, but from the United Kingdom recruited a hacker network attacks demonstrate the power of. Hacker team IS sometimes referred to as Cyber Caliphate, is the end of 2014 by the United Kingdom youth zhunaide·housaiyin (Junaid Hussain) was established. Hussein was only 20 years old in the United Kingdom grew up in Birmingham, he claims to be Trick on the Internet, with skilled IT skills.

Hussein hacker starts at the age of 11, when he was playing online video games. Website Softpedia, in 2012, he said in an interview: "I've always been black, I want revenge, I began to understand hacker techniques through Google. "Hussein found online hacker forums, tutorials, and tools, hacker team Team of 15 years set up its own Poison.

They use a simple way to take over social media accounts, or hacked Web sites. Young Hussein when their actions as a radical action, the seat support to the oppressed people of Palestine and Kashmir. Hussein said: "random websites doesn't make sense, we never attack random Web site. Website is an act of awareness. ”

Team Poison used to make many more "sensational" attacks, claimed to have hacked Facebook founder Mark Zuckerberg (Mark Zuckerberg) personal Web pages, invading NATO, United Kingdom Defence Ministry website, even leaking United Kingdom Tony Blair, the former Prime Minister (Tony Blair) private address book. Even the hacking group "anonymous" to cheer them on.

But the move also make Hussein a target, he charged in 2012 due to cyber attacks on Blair, jailed for 6 months. It was in prison, Hussein from hacker activist into hacker team IS people. 2013 was released on bail after his release, Hussein will soon travel to Syria, started to play for the notorious terrorist organization IS.

Despite Hussein's unprecedented attacks there IS organization, but IS also in a State of confusion. There were 5 different hacking banner IS, often conflicting information between them, not to mention the coordinated action. United States Defense Ministry investigators before Christie said: "it is only temporary, and no organization, just like their social media. ”

But in 2015, network attacks IS beginning to target all over the world. IS hacking United States News Agency website, France city government website, Kuwait Parliament site, has even captured the international business times and Newsweek's Twitter account. They also use the Internet at least 2 anti-IS an activist's true identity, and they were executed on July 2015.

But IS the network's highest-profile attack was to take over the United States Central command's social media accounts, dedicated to combating, this command IS. Kennedy said, certainly from the hand of Saddam Hussein. In January 2015, Hussein by central command to his 109,000 followers Twitter account post says: "United States soldiers, here we go, look out behind you! "He also exposed the contact information for the senior officers and at the central command post IS video on the YouTube page.

Although this is low-grade and simple attack, central command, referred to as "network sabotage", but remains a major victory for IS organizations. No matter how insignificant this victory, but it is revealed to have "cross-border" attacks, played a potential "recruits". Hussein hackers before they start personally recruited friends to join his ranks, although most of the time was rejected. But at least 1, adite·fulizi (Ardit Ferizi, codenamed The3Dir3ctorY) join IS, Arizona, he had hacked the server and download the personal information of about 100,000 people.

In the IS organization, Hussein gradually fame, and let him get on the United States "kill list". In addition to the executioner, "Saint John", but Hussein is considered IS the Organization's top online recruitment, become attack target. Kennedy said: "I cannot say who discovered the whereabouts of Hussein, but they are able to track Hussein's network path, discovered his real identity, since United States bear killed him. ”

In August 2015, La died in an air strike on the outskirts of Al-Hussein, was only 21 years old. Before the air strikes, United States hacker had used Hussein's network tools to counter him, lured him click the link containing the malicious file, revealed his IP address and geographic location. United States Army network warfare officers said: "they are stupid this is a good thing, but it seems to me that the fool is often die before. ”

Hussein's death IS no doubt hackers team has hit hard. 4 months later, Hussein's successor, also was killed in the drone attacks. But the Organization continues to evolve. Although most experts think IS hacking is not good enough, but warned the Organization as time goes by more and more mature, growing threat.

Kennedy said, "both in terms of organization and attack modes, this organization can be the best. But they are increasingly strong sense of technology, I think it only takes 5 years, these terrorists will be able to master the advanced hacking, attacks can be launched with disastrous consequences. ”

Funny thing is, IS already in April 2016 and its different organisations merged into United Cyber hackers Caliphate, although whether it helped to launch coordinated attacks is still unknown, but these moves make the threat increase might lure more skilled hackers to join.

Loose organizational structure tends to attract more sympathizers. Christy explains that some people are claiming IS organized hacker, despite their distance apart. But it IS encouraged so many Lone Wolf attacks, such as the United States made in men aomaer·Mading gay nightclub in Orlando shooting.

United States Army network operations officer said: "only need fairly smart guy, using the Internet can give us a lot of trouble. If you are in Internet cafes in Mogadishu, compared with wave AK-47 or set off a bomb, using networks to create destructive may be greater.


揭秘恐怖组织IS黑客团队:英国少年的复仇成长记 - 黑客,恐怖组织 - IT资讯

6月17日消息,据科技内幕网站报道,对于美国北卡罗来纳州的前突击队成员尼克·帕尔米西亚诺(Nick Palmisciano)来说,FBI特工的出现似乎已经司空见惯。他创建了专做军队服装生意的公司,FBI有时候会来找他了解正接受安全调查的人的信息。但是1年多前,当FBI再次出现在他的办公室时,情况似乎完全不同了。

帕尔米西亚诺说:“FBI拦截到些信息,里面提到了我的名字和住址,显然将我列为高价值目标。”帕尔米西亚诺被恐怖组织IS旗下黑客组织列入“暗杀名单”,上榜者多为军人、政府职员以及平民。这些黑客及其支持者有时候甚至改变了现代战争的面貌。

美国海军陆战队退役士兵、网络安全咨询公司TrustedSec创始人兼CEO大卫·肯尼迪(David Kennedy)说:“IS是首个拥有黑客分支的恐怖组织。从某种程度上说,基地组织也曾有黑客帮助,但IS真正发挥出黑客的威力。”

在占领了伊拉克和叙利亚大片领土后,IS于2014年宣布建国,并将叙利亚城市拉卡定为“首都”。在许多IS武装成员骄傲地展示在战场上缴获的各种重型武器装备时,新的“伊斯兰国”开始吸收具有“软技能”的人才。

美国中国国防部前网络犯罪调查员吉姆·克里斯蒂(Jim Christy)说:“基地组织和IS组织的行事风格完全不同。基地组织利用技术保护自己,而IS则利用其进行宣传和进攻。”基地组织有自己的网站,甚至曾为恐怖分子发布专门的加密通讯软件,但其几乎从未发动过网络攻击。而IS组织则利用笔记本电脑和互联网发动“超越边境式攻击”,包括侵袭网站、接管Twitter账户、散布宣传资料等。

尽管已经有3万多名外国武装人员帮助IS作战,但其从英国招募的黑客却展示出其发动网络袭击的威力。IS的黑客团队有时候又被称为Cyber Caliphate,是2014年末由英国青年朱奈德·侯赛因(Junaid Hussain)建立的。当时年仅20岁的侯赛因在英国伯明翰长大,他在互联网上自称Trick,拥有娴熟的IT技能。

侯赛因的黑客之路始于11岁,当时他正在玩在线视频游戏。他在2012年接受Softpedia网站采访时说:“我总是被黑,我想要复仇,因此我开始通过谷歌了解黑客技术。”侯赛因在网上找到了黑客论坛、教程以及工具,15岁时建立了自己的黑客团队Team Poison。

他们使用简单的方法接管社交媒体账户或黑掉网站。侯赛因年轻时将自己的行为视为激进主义行动,座位对巴勒斯坦和克什米尔等受压迫民众的支持。侯赛因说:“随机攻击网站没有意义,我们也从不随机攻击网站。攻击网站是一种唤醒意识的行为。”

Team Poison曾做出许多“轰动性”攻击,宣称曾黑掉Facebook创始人马克·扎克伯格(Mark Zuckerberg)的个人网页,曾入侵北约、英国中国国防部网站,甚至泄漏英国前首相托尼·布莱尔(Tony Blair)的私人地址簿。就连黑客组织“匿名者”都为他们欢呼。

但是这些举动也让侯赛因成为关注目标,他在2012年因网络袭击布莱尔而受到指控,被判入狱6个月。正是在监狱中,侯赛因从黑客活动家转变成IS组织黑客团队负责人。2013年被保释出狱后,侯赛因很快前往叙利亚拉卡,开始效力于声名狼藉的恐怖组织IS。

尽管侯赛因的出现给IS组织带来前所未有的攻击手段,但当时的IS还处于混乱状态。当时有5个不同的黑客组织都打着IS旗号,它们之间经常发出互相矛盾的信息,更不用提协调行动。美国中国国防部前调查员克里斯蒂说:“它只是临时的,没有任何组织,就像他们的社交媒体。”

但是在2015年,IS开始对世界各地的目标发动网络袭击。IS黑客侵入美国新闻机构网站、法国市政府网站、科威特议会网站,甚至还曾攻陷过《国际商业时报》和《新闻周刊》的Twitter账户。他们还利用网络方式发现至少2名反IS活动家的真实身份,并将他们于2015年7月份处决。

但是IS最高调的网络攻击是接管了美国中央司令部的社交媒体账户,这个司令部专司负责打击IS。肯尼迪说,这肯定出自侯赛因之手。2015年1月,侯赛因通过中央司令部Twitter账户对其10.9万名追随者发布信息称:“美国士兵们,我们来了,留神你们的背后!”他还曝光了高级军官的联系信息,并在中央司令部的YouTube网页上发布IS宣传视频。

尽管这是低级而又简单的攻击,中央司令部称其为“网络破坏行为”,但对IS组织来说依然是一大胜利。无论这种胜利多么微不足道,但是其却展示了拥有“跨境”攻击的能力,发挥了潜在的“招募”效果。侯赛因开始亲自招募以前的黑客朋友加入他的行列,尽管大多数时候遭到拒绝。但至少1人,阿迪特·弗里兹(Ardit Ferizi,代号The3Dir3ctorY)加入了IS,他曾黑掉亚利桑那州服务器,下载大约10万人的个人信息。

在IS组织中,侯赛因逐渐名声鹊起,同时也让他上了美国的“击杀名单”。除了刽子手“圣战约翰”外,侯赛因被视为IS组织顶级在线招募人员,成为值得袭击的目标。肯尼迪说:“我不能具体透露谁发现了侯赛因的行踪,但是他们能够追踪侯赛因的网络轨迹,发现了其真实身份,此后美国空头炸弹炸死了他。”

2015年8月份,侯赛因在拉卡郊外的空袭中死亡,当时仅21岁。发动空袭前,美国黑客曾利用侯赛因的网络工具反击他,引诱他点击含有恶意文件的链接,曝光了他的IP地址和具体地理位置。美国陆军网络战军官称:“他们很蠢这是好事,但在我看来,蠢人往往先死。”

侯赛因的死亡无疑对IS黑客团队造成了重创。4个月后,侯赛因的继任者也在无人机袭击中被击毙。但是这个组织继续保持进化。尽管大多数专家认为IS黑客组织不够好,但都发出警告称,这个组织随着时间推移会越来越成熟,威胁性也将越来越大。

肯尼迪说:“无论是从组织形式、袭击方式来看,这个组织都不能算最好。但他们的技术意识越来越强,我认为只需要5年时间,这些恐怖分子就能熟练掌握先进的黑客技术,可以发动可引发灾难性后果的攻击。”

有趣的是,IS已经于2016年4月份将旗下不同黑客组织合并为United Cyber Caliphate,尽管其是否有助于发动协同攻击还不得而知,但这些举动令其威胁性大增,可能诱使更多技术娴熟的黑客加入。

松散的组织结构更容易吸引同情者。克里斯蒂解释称,有些人宣称自己就是IS组织黑客,尽管他们距离拉卡千山万水。但这就像IS组织鼓励许多独狼袭击者那样,比如美国男子奥马尔·马丁在奥兰多市同性恋夜总会制造枪击案等。

美国军方网络战官员称:“只需要几个相当聪明的家伙,利用网络就可以给我们带来很多麻烦。如果你坐在摩加迪沙的网吧,与挥舞AK-47或引爆炸弹相比,利用网络制造的破坏性可能更大。






If you have any requirements, please contact webmaster。(如果有什么要求,请联系站长)





QQ:154298438
QQ:417480759