Security Experts:

Connect with us

Hi, what are you looking for?



Syrian Electronic Army Member Pleads Guilty to Hacking, Extortion

A member of the Syrian Electronic Army hacker group arrested earlier this year in Germany has pleaded guilty to hacking and extortion charges before a judge in the Eastern District of Virginia.

A member of the Syrian Electronic Army hacker group arrested earlier this year in Germany has pleaded guilty to hacking and extortion charges before a judge in the Eastern District of Virginia.

Peter “Pierre” Romar, 36, pleaded guilty to conspiracy to receive extortion proceeds and conspiracy to unlawfully access computers. According to the U.S. Department of Justice, the man faces up to five years in prison. Sentencing is scheduled for October 21.

Romar had been residing in Germany, where he was arrested by local law enforcement just before U.S. authorities announced the charges against Syrian Electronic Army members. He was extradited to the United States in May.

The Syrian Electronic Army surfaced in 2011 and it was active until recently, when authorities in the United States announced criminal charges against three of the group’s members. The hacker collective breached the systems of many high-profile targets in support of the Syrian regime, including government and media organizations.

According to authorities, Romar and another SEA member, 27-year-old Firas Dardar, known online as “The Shadow,” were also involved in an extortion scheme that targeted organizations in the U.S. and other countries. The cybercriminals breached the systems of various companies and threatened to damage their computers and data unless they paid a specified amount of money.

Since victims could not send the money directly to Dardar in Syria due to sanctions, Romar acted as an intermediary in Germany. U.S. authorities are aware of 14 victims, from which the hackers demanded more than $500,000, although in many cases the amount of the ransom was negotiated and eventually lowered.

Dardar and 22-year-old Ahmad Umar Agha, the SEA member known as “The Pro,” are still at large, and they are believed to be residing in Syria. The FBI has been offering $100,000 for information leading to their arrest.

Related Reading: Briton Accused of U.S. Govt Hack Can be Extradited

Related Reading: Kosovo Hacker Linked to IS Group Gets 20 Years in U.S. Prison

Related Reading: Two Men Arrested in U.S. for Hacking Emails of Top Officials

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Artificial intelligence is competing in another endeavor once limited to humans — creating propaganda and disinformation.


Video games developer Riot Games says source code was stolen from its development environment in a ransomware attack


A new study by McAfee and the Center for Strategic and International Studies (CSIS) named a staggering figure as the true annual cost of...


A digital ad fraud scheme dubbed "VastFlux" spoofed over 1,700 apps and peaked at 12 billion ad requests per day before being shut down.


Cybercriminals earned significantly less from ransomware attacks in 2022 compared to 2021 as victims are increasingly refusing to pay ransom demands.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.