The fight against ISIS might have been decided in Syria, but in cyberspace, it rages on. As ISIS fighters from around the world rallied around their infamous black banner, Anonymous hacktivists answered the call to counter ISIS online.
This on-demand presentation, led by Benjamin Preminger, Cyber Threat Intelligence Specialist at Sixgill, will trace how ISIS used online networks to grow their influence, and how ISIS has taken measures to enforce strong cybersecurity measures among its members Like a Russian-language ISIS cybersecurity manual shared on a dark web forum.
We discuss anonymous and “OP” campaigns, focusing on the DecryptISIS campaign by the hacking group Ghost Squad Hackers (GSH). GSH were able to infect ISIS members’ phones and computers with malware and expose their IP addresses, physical addresses, names, and faces. The DecryptISIS operation provides a rare glimpse into threat actors’ tactics, techniques, and procedures (TTPs), and can help cybersecurity professionals better understand anonymous cyber threats, and how to defend against them.
NOTE: A valid email address is required to receive your requested asset.