- This woman told two students to ‘speak English’ and people are not having it Friday 9:53 PM
- Iconic 1968 drag documentary ‘The Queen’ finally released on Netflix Friday 9:29 PM
- This TikTok account for Chancellor Palpatine is hilarious Friday 8:43 PM
- Did the Space Force logo rip off Star Trek? Friday 6:24 PM
- Disabled people with service dogs say Uber, Lyft drivers are denying them rides Friday 3:25 PM
- TikTok teen famous for greasy hair ends her 8-year reign Friday 2:48 PM
- Police handcuff brown man at subway station for carrying a toy gun Friday 1:20 PM
- Fake clip of Sanders quoting infamous ‘hot chip’ tweet is duping people online Friday 1:16 PM
- The Mars Volta’s Cedric Bixler-Zavala alleges Scientologists behind dog’s death Friday 12:46 PM
- Eminem responds to critics: ‘This album was not made for the squeamish’ Friday 12:42 PM
- ‘The poet, the poem’ meme takes iconic lines and turns them into art Friday 12:40 PM
- People are making dark memes about the coronavirus Friday 12:27 PM
- Trump camp’s ‘head on a pike’ impeachment threat hit with memes Friday 11:34 AM
- What is the #FreeBritney movement, and why is Cher tweeting about it? Friday 10:52 AM
- This YouTuber claims the Saudi government plotted to kidnap him on U.S. soil Friday 10:30 AM
FBI adds suspected Syrian Electronic Army hackers to ‘most wanted’ list
There’s a reward of $100,000 for information leading to the arrest of the hackers.
The FBI today unveiled charges against three Syrian hackers who successfully hijacked websites and social media platforms of the U.S. military and prominent American media organizations, including the Daily Dot.
Amad Umar Agha, 22; Firas Dardar, 27; and Peter Romar, 36, have been charged with multiple conspiracies related to computer hacking under the veil of the Syrian Electronic Army (SEA), a group that works in support of Syrian president Bashar al-Assad.
According to the FBI, Dardar, also known online as “The Shadow,” extorted U.S. businesses for profit with Peter “Pierre” Romar. The duo would allegedly hold the computers they hacked ransom, threatening to destroy or delete data if they weren’t compensated.
The Daily Dot was compromised by SEA in 2013 by a technique called “spear-phishing.” By posing as a staffer and sending infected links to other company employees, the group gained access to our content management system, deleted an article about Assad that they didn’t like (it was quickly restored), and left their mark on an unpublished article.
When the hackers hijacked the Associated Press’s Twitter account, they falsely claimed that explosions had rocked the White House.
The tweet spread like wildfire. The Dow dropped nearly 100 points almost instantly, though stocks did soon bounce back.
“These three members of the Syrian Electronic Army targeted and compromised computer systems in order to provide support to the Assad regime as well as for their own personal monetary gain through extortion,” FBI assistant director Paul M. Abbate said in a statement.
“As a result of a thorough cyber investigation, FBI agents and analysts identified the perpetrators and now continue to work with our domestic and international partners to ensure these individuals face justice in the United States. I want to thank the dedicated FBI personnel, federal prosecutors, and our law enforcement partners for their tremendous efforts to ensure on-line criminal activity is countered, U.S. cyber infrastructure is safeguarded, and violators are held accountable under the law.”
Photos via FBI | Remix by Fernando Alfonso III
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.