- Chelsea Handler tackles system racism in ‘Hello Privilege. It’s Me, Chelsea’ 3 Years Ago
- Gun control proposal: Trump, lawmakers considering background check-conducting app Today 9:05 AM
- How to stream Browns vs. Jets on Monday Night Football Today 7:00 AM
- What are anons? Today 6:30 AM
- How to stream Eagles vs. Falcons on Sunday Night Football Today 6:00 AM
- How to stream ‘Power’ season 6, episode 4 Today 5:00 AM
- How to stream WWE’s Clash of Champions 2019 Saturday 8:00 PM
- How ‘F*ck off Scotland’ became a Scottish rallying cry amid Brexit madness Saturday 6:28 PM
- A Missouri officer resigned after his Islamophobic Facebook posts surfaced Saturday 5:08 PM
- Adding ‘Triggered’ to stock photos of white men creates Netflix comedy special thumbnails Saturday 3:10 PM
- New restaurant in New York has a seriously unfortunate name: ‘Qanoon’ Saturday 1:38 PM
- These are the 10 best ‘Star Wars’ ships Saturday 12:41 PM
- Google Maps helped solve a decades-old missing persons case Saturday 12:27 PM
- Teen who plotted deadly swatting prank over Call of Duty argument gets prison time Saturday 11:58 AM
- RIP to the real star of ‘Stranger Things’: Steve Harrington’s mullet Saturday 11:04 AM
FBI adds suspected Syrian Electronic Army hackers to ‘most wanted’ list
There’s a reward of $100,000 for information leading to the arrest of the hackers.
The FBI today unveiled charges against three Syrian hackers who successfully hijacked websites and social media platforms of the U.S. military and prominent American media organizations, including the Daily Dot.
Amad Umar Agha, 22; Firas Dardar, 27; and Peter Romar, 36, have been charged with multiple conspiracies related to computer hacking under the veil of the Syrian Electronic Army (SEA), a group that works in support of Syrian president Bashar al-Assad.
According to the FBI, Dardar, also known online as “The Shadow,” extorted U.S. businesses for profit with Peter “Pierre” Romar. The duo would allegedly hold the computers they hacked ransom, threatening to destroy or delete data if they weren’t compensated.
The Daily Dot was compromised by SEA in 2013 by a technique called “spear-phishing.” By posing as a staffer and sending infected links to other company employees, the group gained access to our content management system, deleted an article about Assad that they didn’t like (it was quickly restored), and left their mark on an unpublished article.
When the hackers hijacked the Associated Press’s Twitter account, they falsely claimed that explosions had rocked the White House.
The tweet spread like wildfire. The Dow dropped nearly 100 points almost instantly, though stocks did soon bounce back.
“These three members of the Syrian Electronic Army targeted and compromised computer systems in order to provide support to the Assad regime as well as for their own personal monetary gain through extortion,” FBI assistant director Paul M. Abbate said in a statement.
“As a result of a thorough cyber investigation, FBI agents and analysts identified the perpetrators and now continue to work with our domestic and international partners to ensure these individuals face justice in the United States. I want to thank the dedicated FBI personnel, federal prosecutors, and our law enforcement partners for their tremendous efforts to ensure on-line criminal activity is countered, U.S. cyber infrastructure is safeguarded, and violators are held accountable under the law.”
Photos via FBI | Remix by Fernando Alfonso III
Patrick Howell O'Neill is a notable cybersecurity reporter whose work has focused on the dark net, national security, and law enforcement. A former senior writer at the Daily Dot, O'Neill joined CyberScoop in October 2016. I am a cybersecurity journalist at CyberScoop. I cover the security industry, national security and law enforcement.