. | . |
'Syrian Electronic Army' members face hacking charges by Staff Writers Washington (AFP) March 22, 2016 US authorities Tuesday unveiled criminal charges against three members of the so-called "Syrian Electronic Army," which gained notoriety for hacking into news media outlets and making bogus social media posts. The Justice Departments said criminal indictments named Ahmad Umar Agha, 22; Firas Dardar, 27; and Peter Romar, 36, all Syrian nationals. Arrest warrants were issued for all three on charges including conspiracy, unauthorized access to computers, receiving the proceeds of extortion, money laundering and wire fraud. The FBI announced that it added Agha and Dardar to its "Cyber Most Wanted" list and offered a reward of $100,000 for information that leads to their arrest. Both are believed to be residing in Syria. Romar is believed to be living in Germany, according to court documents. The Syrian Electronic Army (SEA) has been known for hitting news outlets that the group claims slant their reporting of the Syria conflict. Their most notorious hack was of The Associated Press Twitter account, resulting in a false 2013 tweet saying President Barack Obama had been injured after two blasts at the White House. The message saw the Dow Jones Industrial Average suffer a "flash crash" before traders realized the tweet was false. Other victims of SEA hacks include the AFP photo department's Twitter account, the BBC, Al Jazeera, the Financial Times and the Guardian. In 2015, the group took over the accounts of France's Le Monde newspaper, tweeting several messages including one reading "Je ne suis pas Charlie." A US investigation said the activity began around 2011 when Agha and Dardar began their campaign in support of the Syrian government and President Bashar al-Assad. "The conspiracy was dedicated to spear-phishing and compromising the computer systems of the US government, as well as international organizations, media organizations and other private-sector entities that the SEA deemed as having been antagonistic toward the Syrian government," a Justice Department statement said. Spear-phishing is a technique in which an attacker sends a message disguised to appear as if it were from a trusted source, asking for credentials that enable the hackers to access accounts. Investigators said the group repeatedly targeted computer systems and employees of the White House but failed to gain access. Executive Office of the President (EOP). Despite these efforts, at no time was an EOP account or computer system successfully compromised. At one point, the Syrian group gained control over a recruiting website for the US Marine Corps and posted a defacement encouraging service members to "refuse (their) orders," officials said. In some cases, the hackers threatened to damage computers, delete data or sell stolen data unless the victims provided extortion payments, prosecutors said. Romar was alleged to be the intermediary to receive extortion payments, which could not be transferred to Syria because of international sanctions. "While some of the activity sought to harm the economic and national security of the United States in the name of Syria, these detailed allegations reveal that the members also used extortion to try to line their own pockets at the expense of law-abiding people all over the world," said Assistant Attorney General John Carlin. "The allegations in the complaint demonstrate that the line between ordinary criminal hackers and potential national security threats is increasingly blurry."
Related Links Cyberwar - Internet Security News - Systems and Policy Issues
|
|
The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us. |