The case of a hacker who allegedly provided ISIS with a "kill
list" Americans — ranging from diplomats to lowly bureaucrats, according
to an NBC News review — shows that online intrusions can put a lot more than
your credit rating at risk.
That was the message Friday from the Justice Department's top
counter-terrorism prosecutor, who said in a speech that "crowdsourcing
terrorism" is a new phenomenon — and a real threat.
"Hackers a world away can intrude into our homes with the
push of a button, to steal from us, to gather intelligence that can be used
against us, and even to try hurt or kill us," John Carlin said at the
Roger Williams University Law School in Providence, Rhode Island.
"We have long warned about the convergence of terrorism and
the cyber threat, but this case is a first of its kind."
Carlin's comments came a day after the Justice Department charged
Ardit Ferizi, a Kosovo hacker living in Malaysia, with giving ISIS 1,351 out of
100,000 names stolen from the Phoenix server of an unnamed U.S. retailer. A
social media guru for the terror group disseminated it with the threat to
"strike at your neck in your own lands."
The people on the list ranged from soldiers to bureaucrats and
were tied to the State Department, foreign embassies, the armed services, NASA,
USAID and even local agencies like the New York City school system and an
Alabama health agency.
While people from U.S. allies like Australia and the United
Kingdom were also included, the overwhelming majority were Americans.
One person on the list, a social-services provider in Maryland,
told NBC News he was surprised to get a call from the FBI about a month ago but
said it had not caused him much worry.
"They said they didn't think it was a high-level risk,"
he said. "I was a little more vigilant at first. But then I kind of forgot
about it."
A couple of the people on the list claimed they were not aware of
it. One person who worked for a local agency in the New York area had the deputy
police chief in his hometown call to decline comment.
Ferizi, alleged to be an ISIS sympathizer, was arrested early
Friday, Malaysia time, and will be transported to Virginia for arraignment. He
faces charges of providing material support to ISIS along with computer related
offenses.
The criminal complaint filed by the U.S. attorney in Alexandria,
Virginia, says Ferizi, who uses the alias "Th3Dir3ctorY," stole the
personal information of "approximately 100,000 people" from the
retailer on June 13 — then stripped out those he believed were from the
military or government.
Evan Kohlmann of Flashpoint Intelligence, an NBC News
counterterrorism analyst, surmised that Ferizi simply zeroed in on emails that
ended in .gov and .mil, regardless of their actual job description. He called
the scheme "crude but effective."
Before the hack, Ferizi had already been in contact with Junaid
Hussain, also known as Hussain al Brittani, a British-born hacker and ISIS
social media guru, the complaint says.
Authorities believe Hussain inspired a number of "lone
wolf" attacks in the U.S., including the ambush of a Prophet Mohammed
cartoon contest in Garland, Texas. He allegedly communicated over the Internet
with Usaama Rahim, who was on his way to kill cops when he was shot to death by
the FBI and Boston Police, and with four men in New York and New Jersey who
expressed allegiance to ISIS and were later indicted.
In July, Ferizi supplied the list to Hussain, who distributed it
Aug. 11 under the rubric of the "Islamic State Hacktivist Division"
with a threat attached:
"O Crusaders, as you continue your aggression towards the
Islamic State and your bombing campaign against the Muslims, know that we are
in your emails and computer systems, watching and recording your every move, we
have your names and addresses, we are in your emails and social media accounts,
we are extracting confidential data and passing on your personal information to
the soldiers of the khilafah, who soon with the permission of Allah will strike
at your necks in your own lands!"
Thirteen days later, Hussain was killed in a U.S. Predator attack
near Raqqa, Syria, the purported capital of the Islamic State.
In the weeks before and after the distribution of the list, the
complaint alleges, Ferizi communicated with the hosting service of the company,
threatening that if they removed his malware, "bad things will happen to
you," including publishing the names of "every client on this
Server."
At one point, he tried to blackmail the company by demanding
"two bitcoin," approximately $500, in return for stopping his attacks
and revealing how he had carried them out, the court papers say.
Source: NBC News
No comments:
Post a Comment