Saturday November 17, 2018
Home Uncategorized Anonymous war...

Anonymous warns of possible ISIS attack on WWE event in US

0
//
Republish
Reprint

The Islamic State or the ISIS plans to attack a World Wrestling Entertainment (WWE) event in Atlanta on Sunday evening, hacker group Anonymous which is engaged in a cyber war with the former following terror attacks in Paris said this week.

In the wake of deadly terrorist attacks in Paris, the group launched its operation against the ISIS.

“The FBI is aware of reports of an alleged threat that includes an Atlanta, Georgia venue and event. While we take all threats seriously, we do not have specific or credible information of an attack at this time,” the federal Bureau of Investigation (FBI) told Channel 2 news.

“We have, however, made the proper notifications as we continue to work closely with our law enforcement and private sector partners to keep our community safe,” the government agency added.

However, FBI Special Agent in Charge J Britt Johnson of the Atlanta office said the agency did not have “specific or credible information of an attack,” The International Business Times reported.

Anonymous revealed on Saturday it has uncovered information about possible ISIS attacks in Paris as well as at locations in the US, Indonesia, Italy and Lebanon on Sunday.

OpParisIntel, a group within Anonymous, released a statement warning the ISIS is planning an attack at the WWE Survivor Series event in the Philips Arena in Atlanta Sunday at 7.30 p.m. EST, besides attacks at multiple places in Paris.

Meanwhile, WWE star Triple H took to twitter saying that the event will take place as planned.

While publishing the list of potential targets alongside a statement, the Anonymous said: “The goal is to make sure the whole world, or at least the people going to these events, know that there have been threats and that there is a possibility of an attack to happen. Another goal is to make sure Daesh knows that the world knows and cancels the attacks, which will disorientate them for a while.”

The targets listed by Anonymous are Cigales Electroniques with Vocodecks, RE-Play & Rawtor at Le Bizen (Paris); Concrete Invites Drumcode: Adam Beyer, Alan Fitzpatrick, Joel Mull at Concrete (Paris); Demonstration by Collectif du Droit des Femmes (Paris); Feast of Christ the King celebrations (Rome/Worldwide); Al-Jihad, One Day One Juz (Indonesia); Five Finger Death Punch (Milan); and University Pastoral Day (Holy Spirit University of Kaslik, Lebanon).

The Anonymous added: “We only appeared now because our goal was to remain undercover and report everything to the right authorities and let them take all the action. But when authorities do not take action, Anonymous does. This part of the op started last Monday and has [been] and will be active 24 hours a day as long as the op is going on.”

The Anonymous told the International Business Times that it had passed proof to the intelligence agencies of the UK and the US.

“If we share the proof [publicly], everyone will start calling it fake because screenshots can be edited and accounts can be deleted. We have purposely not shared account links publicly because they would be shut down immediately and then no one would believe the proof.”

Earlier this week, the Anonymous released a guide to catching the ISIS extremists amid claims that it has already found thousands of extremists online.

The ISIS in its guide – written in both French and English – asks its followers to report extremist Twitter accounts and also tells them how to find and hack accounts besides teaching them how to stay safe online.

The group has shared the full guide on Pastebin, a popular site that Anonymous and others use for posting statements. The site’s main feature is that allows users to host text files without being traceable.

The group says its efforts have already led to closing down of thousands of accounts.

Click here for reuse options!
Copyright 2015 NewsGram

Next Story

Heavy Cyber Attacks From Russia, US, China In India

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

0
cloudhopper,cyber attacks
A man holds a laptop computer as cyber code is projected on him in this illustration picture. VOA

India has been the target of over 4.3 lakh cyber attacks from five countries including China, Russia and the US while more than 73,000 attacks were initiated from India between January and June this year, says a Finnish cybersecurity company.

According to F-Secure’s honeypot data, Russia, the US, China, the Netherlands and Germany targeted India with 436,090 attacks. This is nearly 12 times more than which originated from India.

Honeypots are basically decoy servers that emulate the real IT environment of a business enterprise.

cyber attacks
Due to its nature, the chip is physically unclonable and can, thus, render the device invulnerable to hijacking, counterfeiting or replication by cyber-criminals. Pixabay

Russia accounted for most cyber attacks on India (255,589), followed by the US (103,458), China (42,544), the Netherlands (19,169) and 15,330 attacks from Germany.

On the other hand, the top five countries that were targeted by Indian cyber attackers were Austria, the Netherlands, the UK, Japan, and Ukraine — a total of 36,563.

F-Secure gave the break-up: Austria (12,540), the Netherlands (9,267), the UK (6,347), Japan (4,701) and 3,708 attacks targeted Ukraine’s businesses.

“The relatively higher number of inbound attacks on Indian honeypots reflects how the fast-digitising country is becoming more lucrative for global cyber criminals,” Leszek Tasiemski, Vice President of cyber security products R&D at F-Secure, said in a statement on Sunday.

Cryptocurrency, cyber attacks
Experts: Cyber attacks Growing Increasingly Sophisticated. Pixabay

“We are gathering and analysing all the pertinent data to ensure that our customers stay protected given the dynamically evolving threat landscape,” he added.

To track these cyber attacks, F-Secure has deployed 41 honeypots across the globe.

“Our public honeypots are a valuable source of threat intelligence and an integral part of the infrastructure that powers our various security offerings, including our Rapid Detection and Response Service,” Tasiemski said.

Honeypots are set up explicitly to grab attention of attackers. They are used to gain critical insights on attack types, popular targets, sources, volume and TTPs (Tactics, Techniques and Procedures).

Such insights are collected by deliberately allowing potential attackers to gain unauthorized access to the emulated services of a server and then studying the attack path to the point that the attacker realizes it is a honeypot, F-secure said.

Also Read: U.S. Government Warns People Against China-Linked Hacking Group

These honeypots are developed to deceive even elite hackers and appear to be serving a specific purpose or organisation.

They enable F-Secure to collect the latest malware samples or shell scripts and new hacking techniques.

The research data is then processed to further benefit F-Secure customers via product enhancements and threat intelligence reports. (IANS)