• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

China-linked APT Salt Typhoon targets Canadian Telecom companies

 | 

U.S. warns of incoming cyber threats following Iran airstrikes

 | 

McLaren Health Care data breach impacted over 743,000 people

 | 

American steel giant Nucor confirms data breach in May attack

 | 

The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

 | 

Iran-Linked Threat Actors Cyber Fattah Leak Visitors and Athletes' Data from Saudi Games

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 50

 | 

Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Iran confirmed it shut down internet to protect the country against cyberattacks

 | 

Godfather Android trojan uses virtualization to hijack banking and crypto apps

 | 

Cloudflare blocked record-breaking 7.3 Tbps DDoS attack against a hosting provider

 | 

Linux flaws chain allows Root access across major distributions

 | 

A ransomware attack pushed the German napkin firm Fasana into insolvency

 | 

Researchers discovered the largest data breach ever, exposing 16 billion login credentials

 | 

China-linked group Salt Typhoon breached satellite firm Viasat

 | 

Iran experienced a near-total national internet blackout

 | 

Malicious Minecraft mods distributed by the Stargazers DaaS target Minecraft gamers

 | 

Healthcare services company Episource data breach impacts 5.4 Million people

 | 

Watch out, Veeam fixed a new critical bug in Backup & Replication product

 | 

U.S. CISA adds Linux Kernel flaw to its Known Exploited Vulnerabilities catalog

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Intelligence
  • Security
  • Al Qaeda continues to frighten the U.S, the cyber war is begun

Al Qaeda continues to frighten the U.S, the cyber war is begun

Pierluigi Paganini May 26, 2012

Many experts are convinced that the death of Bin Laden marked the end of an ideological group that has been beheaded of its leaders and that began to slowly fall apart. The same experts are convinced that from the rubble of the group might begin small groups, definitely dangerous, but without a central coordination that can make them really offensive as the original organization.

Other security experts believe that the historical group is changing its skin exploring new offensive ways, in particular they are convinced that next wave of attacks will come from the cyber space.

A a secret report issued December 21 by the Canadian Office of Critical Infrastructure Protection and Emergency Services raises the specter of a possible future cyber attack by agents or sympathizers of Osama bin Laden’s al Qaeda terrorist organization. Although to date there is no proof of the al Qaeda’s interest in a cyber offensive the possibility of conducting a cyber attack is high considering the huge financial resources of the group to purchase the equipment required and to acquire the needed expertise.

“Bin Laden’s vast financial resources, however, would enable him or his organization to purchase the equipment and expertise required for a cyber attack and mount such an attack in very short order.”

In one of its interviews bin Laden has spoken regarding the possible constitution of a cyber army.

“hundreds of Muslim scientists were with him who would use their knowledge … ranging from computers to electronics against the infidels,”

according to the Canadian report bin Laden may have planned a cyber attacks against the West.

Recently it has been published on internet an Al Qaeda video of six-minute and that instructs Al Qaeda followers regarding U.S. vulnerability to cyberattacks inviting Muslims to the battle.

Susan Collins and Joe Lieberman, chairman of the Senate Homeland Security Committee , consider it very disturbing, they declared in fact:

“This tape is really alarming,”

“It’s essentially instructing anybody who’s sympathetic with Al Qaeda’s ideology to engage in cyberattacks, and the tape is telling them how easy it is to do so.”

The US official are scared by the video, sources of intelligence have  confirmed in recent months that many terroristic groups are trying to arrange a cyber offensive against US. Recent public reports have demonstrated that Western critical infrastructures are still too vulnerable to cyber attacks and for this reason is trying to engage a cyber war against its enemy.

Cyber security experts are continuously alerting US government regarding the increasing of number of attacks against control systems of critical infrastructure of the country.

The senators Lieberman confirmed that the Homeland Security Department responded to 100,000 cyber incidents in 2011, and informing that there has been a spike in cyber intrusions maybe made by Iranian hackers.

It’s clear that in this scenario Al Qaeda could collaborate with other hostile countries to attacks the US and also to acquire capacity and knowledge to drive an attack against US.

“There is real evidence that the Al Qaeda groups want to pursue and are beginning to pursue the capacity to launch a cyberattacks against America,”

“I mean, that is the real and present danger and that Iran will share that cyberattack capacity with terrorist groups.”

The US monitoring is focused on cyber terrorism threat, new subversive groups are planning to attack US on its soil compromising strategic plants such as nuclear facilities or power grids. CIA and international intelligence agencies have started a massive campaign of prevention that has as objective the monitor of the web to prevent cyber attacks or the organization of terroristic events.  US cyber army is also attacking the principal web site used by Al Qaeda for activities of propaganda.

Last month Al-Qaeda’s main internet forums have been attacked, they were offline for several days,many others sites were downed during last weeks including two of the terrorist organization’s top sites, al-Fida and Shamukh al-Islam.  The nature of the attacks suggested the intervention of groups of hackers hired by governments committed to the fight against terrorism.

Recently the State Department has launched several covert cyber operations against al-Qaida hacking into al-Qaida websites in Yemen, secretary of State Hillary Clinton confirmed that cyber experts based at the State Department hacked Yemeni tribal websites, replacing al-Qaeda propaganda that bragged about killing Americans.

“Within 48 hours, our team plastered the same sites with altered versions of the ads that showed the toll al-Qaeda attacks have taken on the Yemeni people,”

Yemen’s al-Qaida in the Arabian Peninsula, is considered one of the most active and dangerous cells, responsible of several attacks that have killed hundreds of Yemeni soldiers and accused to be organizers for several attacks against US.

Clinton also added that the cyber attacks have been arranged creating dedicated a task force of specialists, including special operators and intelligence analysts, housed at the State Department.

Authors of the success are the experts of the Center for Strategic Counterterrorism Communications, that patrol the Internet and social media gathering information on al-Qaida’s, on its propaganda and on its recruiting campaign.

“Together, they will work to pre-empt, discredit and outmaneuver extremist propaganda,” Clinton said.

As described confirms the importance of a cyber strategy which seeks to defend the major U.S. facilities and work to prevent cyber attacks against the American people.
This is just another battle that the U.S. must prepare for.

Pierluigi Paganini

 


facebook linkedin twitter

Al-Qaeda Critical infrastructures cyber strategy cyber terrorism cyber war cyberattacks Hackers Intelligence US

you might also like

Pierluigi Paganini June 24, 2025
China-linked APT Salt Typhoon targets Canadian Telecom companies
Read more
Pierluigi Paganini June 22, 2025
Security Affairs newsletter Round 529 by Pierluigi Paganini – INTERNATIONAL EDITION
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    China-linked APT Salt Typhoon targets Canadian Telecom companies

    APT / June 24, 2025

    U.S. warns of incoming cyber threats following Iran airstrikes

    Cyber warfare / June 24, 2025

    McLaren Health Care data breach impacted over 743,000 people

    Data Breach / June 23, 2025

    American steel giant Nucor confirms data breach in May attack

    Data Breach / June 23, 2025

    The financial impact of Marks & Spencer and Co-op cyberattacks could reach £440M

    Cyber Crime / June 23, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT