Anonymous Sudan: Pro-Islamic Hacker Group Engages in Cryptocurrency Donation Campaign
Anonymous Sudan, a pro-Islamic hacker group, has recently published a donation campaign on
Recent years have seen increasing cyber-attacks on political targets, crucial infrastructure, and the Web sites of commercial corporations. These attacks, which are also, increasingly, receiving international attention, are perpetrated by nation-state actors (which do not take responsibility for them); groups of hackers (such as Anonymous); criminal organizations; and lone hackers. Nation-state actors are becoming ever more aware of the cyber threat, and are assessing its effect on their national security. To this end, many of them are finding (and funding) ways to develop the defense mechanisms to cope with the threat, as well as their own offensive capabilities. Terrorist organizations are also a part of this dynamic, mutable environment. During the past two years, global jihad groups have also been honing their ability to act in cyberspace. They are extending their activities from “typical” use of the Internet for communication, recruitment of operatives, fundraising, propagandizing, incitement to hatred and violence, intelligence gathering, and psychological warfare, to attacks on the enemy’s critical infrastructure cyber warfare techniques. Increasingly, terrorist organizations are integrating the information available to them from the virtual world with that available to them in the real world, and using the former to develop offensive capabilities in the latter. This they call “electronic jihad”. Given these developments, and as part our belief that “sharing information increases our ability to confront terrorism”, the International Institute for Counter-Terrorism (ICT) at Reichman University has decided to disseminate a periodic report and analysis of information gathered by our cyber-terrorism desk. This new publication joins the ICT’s series of publications: This and forthcoming cyber-desk newsletters will address two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). In addition, through our Collaboration with the Lauder School of Government, Diplomacy and Strategy, we offer a 10 credits specialization in Cyber-Terrorism as part of our MA Program in Government with Specialization in Counter-Terrorism. Anonymous Sudan, a pro-Islamic hacker group, has recently published a donation campaign on On November 22nd, Cyber Toufan al-Aksa hacker group released a press statement on On 07 OCTOBER 2023, Hamas, the Palestinian terrorist group based in the Gaza The article examines the recent media jihad campaign “Supporting Ribat and Jihad” conducted The article explores the benefits, challenges, and potential impact of ChatGPT, an advanced This paper aims to raise awareness among policymakers and security forces regarding the Elon Musk’s purchase of Twitter, considered part of the Big-Tech ecosystem, heralds an The following article describes Afaq’s role in Islamic State’s cyber defense arena over Cyberspace has become one of the main arenas for state warfare. It is Summary Throughout the latter quarter of 2021, online supporters of the Islamic State Summary: With the proliferation, spread, and impact of violent extremist and terrorist content Executive Summary Throughout the period under review (April-June 2021), terror activity continued to The first quarter of 2021 has shown a continuation of efforts by terrorist This report covers the period of July-December 2020 The potential of cyberspace was identified by terror organizations over a decade ago. This report covers the period of January – March 2020 This report covers the period of July – September 2019 This report covers the period of April – June 2019 While monitoring Bitcoin address 1LaNXgq2ctDEa4fTha6PTo8sucqzieQctq, an irregular increase in the scope of activity This report covers the period of January-March 2019. An Examination of a Potential Connection between the Trafficking of Women on the Darknet and In January 2018, the ICT published a document reviewing the use of virtual Download the full article The term “pre-crime” was coined in the film Written by Dr. Michael Barak and Nadine Liv Download the full article Key Findings There is a growing trend of The cyber domain is composed of cellular technologies, space-based communications, and intranets, in Electronic jihad refers to two aspects. The first is operative, and deals with This report covers the period of July-September 2018. Chinese hacker groups have become professional, strategic, and operate with improved tactics. They Introduction The Cyber Space has become an important factor in the modern The evolution of cyber crime has lead to more sophisticated attacks in Africa, This report covers the period of April-June 2018. This report covers the period of January-March, 2018. This report covers the period of December 2017. Sporadic evidence of terrorists’ use of digital currency has been in existence sinceCyberspace has become an important battlefield, and an integral part of current and future conflicts.
Dr. Eitan Azani
Co-Head of Desk
Ms. Daniel Haberfeld
Co-Head of Desk
Related Publications
Anonymous Sudan: Pro-Islamic Hacker Group Engages in Cryptocurrency Donation Campaign
Cyber Toufan al-Aksa Hacker Group Join the Cease Fire
Hamas Media Campaign: “Al Aqsa Flood”
Media Jihad Campaign: The Islamic State’s Response to Deplatforming
Is the Chatbot a Threat or an Opportunity for Security Organizations?
Trump’s Indictment and the Weaponization of Conspiracy Theories by the Far-Right
Big Tech Becomes Alt-Tech
The end of the Islamic State’s Cyber Security Unit Afaq?
Trends in Cyber-Terrorism 2021
Supporters of the Islamic State Campaign for the Holidays: Encouraging Lone-Wolf Attacks in the West
The Dead Drops of Online Terrorism
Cyber Report April-June 2011
Cyber Report January-March 2021
Cyber Report 34 – July-December 2020
Cyber Report 33 – April-June 2020
ICT Cyber-Desk Review: Report #33
ICT Cyber-Desk Review: Report #32
ICT Cyber-Desk Review: Report #31
Identifying Money Transfers and Terror Finance Infrastructure
ICT Cyber-Desk Review: Report #30
Potential Connection between the Trafficking of Women on the Darknet and the Financing of Terrorism
Jihadists Use of Virtual Currency 2
Crime Prediction Technologies
Archive as a Platform for Storing and Disseminating the Propaganda Materials
IS-Supporting Hacktivists in Southeast Asia
IRGC Cyber-Warfare Capabilities
United Cyber Caliphate
ICT Cyber-Desk Review: Report #28
ICT Cyber-Desk Report: Chinese Hacker Groups
ICT Cyber-Desk Report: Kybernetiq
ICT Cyber-Desk Report: Cyber threats on African subjects
ICT Cyber-Desk Review: Report #27
ICT Cyber-Desk Review: Report #26
ICT Cyber-Desk Review: Report #25
ICT Cyber-Desk Report: Jihadists’ Use of Virtual Currency