Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cyberwarfare

Fears Grow over Jihadist Cyber Threat

Lille, France – Jihadists have yet to shut down a power grid, paralyze a transport network or banking system or take over a key industrial site from afar, but experts say the threat of such a cyber attack should be taken seriously.

Lille, France – Jihadists have yet to shut down a power grid, paralyze a transport network or banking system or take over a key industrial site from afar, but experts say the threat of such a cyber attack should be taken seriously.

Analysts fear that while extremist groups may not have the necessary skills themselves, they could hire someone else to wreak havoc.

“Digital attacks with major impacts are unlikely in the short term,” said Guillaume Poupard, head of France’s digital security service ANSSI, speaking to AFP at an international cyber security conference in Lille, France.

“However, that could change very fast. Our real fear, and we may already be there, is that they will use mercenaries, people who will do anything for money,” Poupard said.

The Islamic State group, Al-Qaeda and other jihadist groups are so far using the internet mainly for propaganda and recruitment purposes.

“The skills are complex, though not at the level of a nuclear weapon,” Poupard said.

“With a few dozen people, a little money, but not that much, you can be effective.”

Earlier this month, Europol director Rob Wainwright also warned of the use of digital mercenaries by jihadist groups at the World Economic Forum in Davos, Switzerland.

Advertisement. Scroll to continue reading.

“Even if they don’t have access to the capabilities, they can simply buy it on the darknet (a hidden internet realm of encrypted websites), where there is an enormous trade in cyber criminal technology,” Wainwright said at a panel discussion on “Terrorism in the Digital Age”.

“That said, attacking the critical national infrastructures at least of most countries is… not easily done, and it’s something that is not as immediate and showy as firing automatic weapons in a theatre or in public,” he added.

Data pirates and cyber criminals from several countries, often linked to organized crime, offer their services on the darknet.

Given the anonymity of the sites, some may help jihadists without realizing it.

“In fact, that’s our fear,” Poupard said. “It’s no so much that IS can quickly develop cyberattacks but that they will be able to go through intermediaries.”

– Asymmetrical warfare –

Speaking in Davos, retired Pakistani general Raheel Sharif said cyber terrorism is “a real threat”.

“As technology improves, the possibility exists that someone can hack into a very sophisticated system and control that resource in such a way as to do maximum damage somewhere.”

Most developed countries are steadily boosting their defenses against the cyber threat, be it terrorism, crime or espionage.

“Terrorist groups that currently use the internet for planning, propaganda and recruitment purposes could become full players in the cyber arena,” French Defense Minister Jean-Yves Le Drian said last month as he unveiled his country’s policy on military cyber security.

“Since asymmetrical operations are naturally etched into their DNA, cyber space gives them an obvious field of action, where major damage can be inflicted with limited means,” he said.

Disturbing precursors of more insidious actions ahead are internet interlopers that do not steal or destroy data but appear to map websites, preparing offensive weapons for later use.

“This kind of attack has even begun in some countries,” Poupard said. “We are closely following what’s happening in Ukraine where strange breakdowns are becoming frequent that are caused by extremely sophisticated actions.” 

Related: ISIS Cyber Capabilities Weak, Poorly Organized: Report

Related: ISIS Cyber Ops: Empty Threat or Reality?

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Cyberwarfare

WASHINGTON - Cyberattacks are the most serious threat facing the United States, even more so than terrorism, according to American defense experts. Almost half...

Cyberwarfare

Russian espionage group Nomadic Octopus infiltrated a Tajikistani telecoms provider to spy on 18 entities, including government officials and public service infrastructures.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Cyberwarfare

Several hacker groups have joined in on the Israel-Hamas war that started over the weekend after the militant group launched a major attack.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Cyberwarfare

The war in Ukraine is the first major conflagration between two technologically advanced powers in the age of cyber. It prompts us to question...

Cybercrime

On the first anniversary of Russia’s invasion of Ukraine, cybersecurity companies summarize the cyber operations they have seen and their impact.

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...