Skip links

Author: Cyber Desk

Cyber Toufan al-Aksa Hacker Group Join the Cease Fire

On November 22nd, Cyber Toufan al-Aksa hacker group released a press statement on their official Telegram channel, declaring they will halt their ongoing operations against Israel in cyberspace in light of the Israel-Hamas ceasefire. They expressed their intent to resume operations after the ceasefire, with

Cyber Report April-June 2011

Executive Summary Throughout the period under review (April-June 2021), terror activity continued to permeate through the cyber arena. Jihadist terrorist groups continued their efforts spanning from operational to defensive and offensive actions. Terror groups have also been continuing the trend of using various social media

Cyber Report January-March 2021

The first quarter of 2021 has shown a continuation of efforts by terrorist organizations to utilize cyber space for a variety of purposes. As such , January saw an escalation in the far right extremism movement with the inauguration of United States President Joe Biden.

Assessing the Cyber Threat to the Train Industry

Over recent decades we have witnessed several successful attacks and attempts by terrorist organizations to strike trains around the world. Most of these attacks were carried out in Asia and Europe where the rail infrastructure is a common means of transportation. An attack and/or successful

Use of the ZeroNet Network by the Islamic State

During the month of September 2016, members of Cyber Kahilafah began to promote and advertise the use of a technology called ZeroNet, which enables decentralized Web site hosting using a peer-to-peer (P2P) network. The obvious advantage of this technology, which was initially released in 2015,

Killing Lists – The Evolution of Cyber Terrorism?

Over the past year, there have been increasing calls warning of the possible danger of a successful cyber-attack by the Islamic State against the West. In the beginning of April 2016, Admiral Michael Rogers, Commander of the US Cyber Command, claimed that the IS could

Analysis of Cyber Trends 2016

The potential of cyberspace, including the Internet, was first recognized by terrorist organizations over a decade ago but in recent years there has been a significant increase in the scope of Internet use and in the level of sophistication with which it is used. At

Financing Terrorism through Advertisements on Jihadist Websites

The information gathered by our team over the last few months indicates that terrorist groups are fundraising to finance their activities by placing commercial advertising on Websites used by jihadist elements to store information and messages. Similar efforts were discovered back in 2006, in the

The Use of IoT in Offensive Cyber Activities

The realm of cyber-attacks has advanced over the years, both in regards to the scope of the phenomenon and in terms of the technological abilities displayed by the attackers. One recently developing field in this realm is the use of terminal equipment, including communications equipment

ICT Cyber-Desk Report: Op-Israel 2017

Op-Israel is the name given to a campaign of cyber-attacks carried out by hackers identified withthe international anarchic group ‘Anonymous’, and with pro-Palestinian hacker groups, againstIsraeli Internet sites with the goal “to disconnect Israel from the cyber world”.

ICT Cyber-Desk Review: Report #20

The main trends identified in the first quarter of 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and international defense policy.

ICT Cyber-Desk Review: Report #21

The main trends identified during the month of April 2017 were analyzed on five axes: operational uses; defensive tactics; offensive tactics; cyber-crime and cyber-terrorism; and counter-measures to protect against cyber-crime.

ICT Cyber-Desk Report: Jihadists’ Use of Virtual Currency

Sporadic evidence of terrorists’ use of digital currency has been in existence since 2012 and there is no doubt that in recent months this trend has been growing and taking shape and now holds a prominent presence online. ICT’s Cyber-Desk reviewed documented cases of jihadists’

ICT Cyber-Desk Report: Cyber threats on African subjects

The evolution of cyber crime has lead to more sophisticated attacks in Africa, from password theft to credit card fraud and attacks on entire computer networks, with hundreds of millions of African cyber attacks on an annual basis. Serainu ranked the government and banking sectors as being

ICT Cyber-Desk Report: Kybernetiq

Introduction   The Cyber Space has become an important factor in the modern terrorism strategy. Not only are terrorists using the internet to advance their goals, they are also innovating and adapting to changes in the technological environment. In order to fight terrorism effectively, we

IRGC Cyber-Warfare Capabilities

The cyber domain is composed of cellular technologies, space-based communications, and intranets, in addition to the internet of networked computers. Cyberspace often has a physical infrastructure layer which is dictated by the financial laws of rival capitals along with partisan laws of control and self-governing