• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

Allianz Life data breach exposed the data of most of its 1.4M customers

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

 | 

Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

 | 

Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

 | 

Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

 | 

Operation CargoTalon targets Russia’s aerospace with EAGLET malware,

 | 

Unpatched flaw in EoL LG LNV5110R cameras lets hackers gain Admin access

 | 

Koske, a new AI-Generated Linux malware appears in the threat landscape

 | 

Mitel patches critical MiVoice MX-ONE Auth bypass flaw

 | 

Coyote malware is first-ever malware abusing Windows UI Automation

 | 

SonicWall fixed critical flaw in SMA 100 devices exploited in Overstep malware attacks

 | 

DSPM & AI Are Booming: $17.87B and $4.8T Markets by 2033

 | 

Stealth backdoor found in WordPress mu-Plugins folder

 | 

U.S. CISA adds CrushFTP, Google Chromium, and SysAid flaws to its Known Exploited Vulnerabilities catalog

 | 

U.S. CISA urges FCEB agencies to fix two Microsoft SharePoint flaws immediately and added them to its Known Exploited Vulnerabilities catalog

 | 

Sophos fixed two critical Sophos Firewall vulnerabilities

 | 

French Authorities confirm XSS.is admin arrested in Ukraine

 | 

Microsoft linked attacks on SharePoint flaws to China-nexus actors

 | 

Cisco confirms active exploitation of ISE and ISE-PIC flaws

 | 

SharePoint under fire: new ToolShell attacks target enterprises

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Hacking
  • Intelligence
  • Security
  • IntelCrawler profiled Syrian Electronic Army group

IntelCrawler profiled Syrian Electronic Army group

Pierluigi Paganini March 23, 2014

The intelligence firm IntelCrawler has published a report on the activities of the Syrian Electronic Army. Are they hacktivists or cyber spies?

IntelCrawler, a cyber-threat intelligence company has recently issued an interesting report on the activities of the Syrian Electronic Army (SEA), the experts analyzed a series of event since since its first appearance in 2011.

The report titled “Syrian Electronic Army – Hacktivision to Cyber Espionage?” shows that in the beginning Sysrian Electronic Army mission was mainly politically motivated, members of the collective hacked to spread political messages pro Syrian President Bashar Al-Assad. The group is considered today as the most famous hacking organization in the world.

But over time, the group has increased its popularity, targeting principal enterprises like Microsoft and Twitter, and media agencies like The New York Times. As revealed by the reports the “SEA has evolved into the realm of global espionage, where some of their targets are “C” level executives at technology and media companies, allied military procurement officers, United States defense contractors, and foreign attaches and embassies.” 

Recently the Syrian Electronic Army has leaked documents from US CENTCOM posting online the image related to folders composing the repository of Army Knowledge Online (AKO) which provides web-based enterprise information services to the United States Army.

Too many security analysts mistakenly underestimate the ability of the group that systematically evaded the defense systems of companies and military organizations. The Syrian Electronic Army has used malware and sophisticated hacking tools for its attack, demonstrating that his members are highly skilled hackers. In the the following graph is possible to see a group called “The Pro” (Th3Pr0) which is one of the most aggressive and stealth collective in SEA responsible responsible for the majority of past hacks – the Leader of Special Operations Department of Syrian Electronic Army.

 

Syrian Electronic Army graph

 

The majority of attacks conducted by the Syrian Electronic Army were spear phishing, as observed in the case of the attack against CNN blogs the hackers are also able to conduct a multi-stage attack to obtain information to use in successive offensives.

“With this type of breach to email contacts and content, the SEA can send trusted emails from one company CEO to another or move laterally within the now compromised organization. Many modern businesses’ spend millions of dollars on network security, protecting against emerging Advanced Persistent Threats (APT’s), new exploits, malicious code, and zero-day vulnerabilities, only to have a key executive compromised via spear phishing and essentially expose potential keys to the kingdom. “

The report issued by IntelCrawler highlighted that high level technical people who have fallen victim of SEA and had their email compromised.

The report includes a detailed timeline of the SEA attacks outlining the techniques adopted by members of SEA, experts at Itelcrawler tried to identify most valuable members of the team describing also tools and tactics they adopted.

Syrian Electronic Army attacks

According the experts today SEA is mainly operating for cyber espionage purpose, it is interested to acquire sensitive documents.

“We’ve laid out the hacktivision attacks chronologically and then moved to the cyber espionage attacks where the SEA has a specific agenda to acquire sensitive documents. “

It must be considered that Many of the Syrian Electronic Army’s exploits and successes have gone unreported, many security experts believe that the group is managing a huge quantity of information collected during its attacks, and it is likely that many of the announced offensives are part of a diversionary tactic. Experts at IntelCrawler, the Syrian Electronic Army is operating mainly for cyber espionage.

” Besides the known public hacks revealed by the SEA in the press, there is a large cyber espionage campaign targeted against foreign governments and officials from different countries. Their masked hacktivison is initially unveiled with a serious of attacks against Qatar and the Turkish government in the beginning of 2013.  Besides governments, the SEA will target several organizations from various industries with tactics of modern cyber warfare, which may affect geopolitical relations and financial markets.”

Let’s close this post with a series of information I have in an interview with Dan Clements, President IntelCrawler.

IntelCrawler has revealed information about large cyberespionage campaign by SEA, why did they do it?

They started out as hacktivists but we believe their success attracted more resources and the gleaning of sensitive material on military issues was attractive treasure for all anti-US and anti Israeli middle east countries.
Some of the SEA members were identified by you, what are the next steps with them?
They will continue to hack and hide, but new movements may help Identify them further. The exposure of their tools and tactics gives security companies and governments a heads up to prepare defenses. At some point, their identities will be confirmed and countries will have to decide if they committed war crimes or just criminal intrusions.
 How can you describe SEA tactics and instrument arsenal? 
Besides a very well crafted phishing campaigns, they have access to bullet proof hosts to prepare a second set of attacks, possibly using malware, against already compromised entities.

Pierluigi Paganini

(Security Affairs –  Syrian Electronic Army, Spear Phishing)


facebook linkedin twitter

Bashar al-Assad cyber espionage Facebook Hacking IntelCrawler Iran phishing campaigns SEA Syrian Electronic Army Twitter

you might also like

Pierluigi Paganini July 26, 2025
Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme
Read more
Pierluigi Paganini July 25, 2025
Operation CargoTalon targets Russia’s aerospace with EAGLET malware,
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    Allianz Life data breach exposed the data of most of its 1.4M customers

    Data Breach / July 27, 2025

    SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 55

    Malware / July 27, 2025

    Security Affairs newsletter Round 534 by Pierluigi Paganini – INTERNATIONAL EDITION

    Breaking News / July 27, 2025

    Law enforcement operations seized BlackSuit ransomware gang’s darknet sites

    Cyber Crime / July 26, 2025

    Arizona woman sentenced for aiding North Korea in U.S. IT job fraud scheme

    Intelligence / July 26, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT