Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cybercrime

US Sanctions Two ISIS-Affiliated ‘Cybersecurity Experts’

US Treasury Department announces sanctions against two Egyptian nationals accused of running an ISIS cyber platform.

The US Treasury Department on Tuesday announced sanctions against two ‘cybersecurity experts’ accused of running a platform affiliated with the Islamic State group.

The sanctioned individuals are both Egyptian nationals. One of them is Mu’min Al-Mawji Mahmud Salim, the creator of a platform named Electronic Horizons Foundation (EHF), which provides cybersecurity training and guidance to ISIS supporters.

The platform offers information on conducting cyber operations, including for evading law enforcement and working with cryptocurrencies.

The second sanctioned individual is Mu’min Al-Mawji’s partner, Sarah Jamal Muhammad Al-Sayyid, who allegedly helped run the EHF platform. 

“Sarah Jamal recruited other ISIS members to join EHF and procured web servers to host ISIS platforms on behalf of EHF.  Sarah Jamal collaborated with Mu’min Al-Mawji on EHF projects including logistical management and cryptocurrency support,” the Treasury Department said.

The two have been added to the FBI’s wanted list and the agency is offering rewards of up to $20,000 for information on their location. 

The latest round of sanctions also targeted Faruk Guzel, a Turkish national accused of transferring funds to ISIS-affiliated individuals in Syria. 

The sanctions come roughly one week after the US, UK and Australia announced sanctions against a Russian man for his role in the 2022 ransomware attack on Australian healthcare insurer Medibank.

Last year, the US sanctioned a North Korean university believed to be responsible for training the country’s hackers.  

Advertisement. Scroll to continue reading.

Related: US Sanctions North Korean Cyberespionage Group Kimsuky

Related: US Sanctions Cryptocurrency Mixer Sinbad for Aiding North Korean Hackers

Related: US Sanctions Russian National for Helping Ransomware Groups Launder Money

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Gain valuable insights from industry professionals who will help guide you through the intricacies of industrial cybersecurity.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Cybercrime

As it evolves, web3 will contain and increase all the security issues of web2 – and perhaps add a few more.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

Luxury retailer Neiman Marcus Group informed some customers last week that their online accounts had been breached by hackers.

Cybercrime

Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.

Artificial Intelligence

The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.

Cybercrime

Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.