Menu

2 August

The face of Islamic hacktivism: Group-IB unmasks Pro-ISIS hackers

Group-IB, one of the global leaders in providing high-grade Threat Intelligence and best in class anti-fraud solutions, in close cooperation with Law Enforcement Agencies has conducted research revealing the individuals behind the United Islamic Cyber Force (UICF).

UICF is an active pro-Islamic hacker group responsible for a chain of high-profile cyberattacks in different regions – which have been extensively covered in the media. This investigation unmasked a number of cybercrime community members fronting from 60 hacker groups and exposed their identities.

Hacktivism is a synthesis of social activism and hacking. All hacktivist operations – whether they are DDoS, deface attacks, or data theft – have one goal: to attract maximum public attention. This is one of the main reasons, why state agencies, large state-connected businesses, media or media personalities are their primary targets. Ideological, political, or religious differences and disputes form the basis of hacktivists’ activities.

UICF members have participated in numerous high-profile operations:

  • Attack on French Internet sites, after the terrorist attack on the Parisian editorial offices of Charlie Hebdo.
  • “Hackintifada” directed against Israeli websites and online resources, such as the website of the Ministry of Foreign Affairs and the Ministry of Education.
  • Attack on the state resources of India caused by blocking video hosting and file-sharing resources in the country and a crackdown on piracy.
  • Deface attack on Bloc Québécois, a federal political party in Canada, in response to the criticism by Canadian politicians of a Muslim woman who appeared in a hijab in the House of Commons. Official content was replaced with pro-Islamic radical slogans, partially connected with ISIS.
  • A number of other activities driven not by financial gain, but political and ideological reasons.

 
Group-IB Threat Intelligence system enabled company experts to track hacktivist attacks conducted in different operations and identify interrelations between the groups and their members, as well as identities behind each alias. One of the main outcomes of the investigation was that hacktivists were not professional cybercriminals, unlike those who attack banks and corporations. In the overwhelming majority of cases, they turned out to be young people with a low level of technical skills, limited life experience, who had fallen victim to propaganda.

So far, hacktivists do not pose a real risk to companies that take their information security seriously. But it would be a mistake to ignore this threat. Hacktivists can shift their efforts from DDoS or hacking poorly protected websites to attacks on critical infrastructure – this is the worst case scenario.

The main aim of 98% hacker attacks is gaining financial benefit – from direct money theft, to stealing data for further monetization. Cyberattacks on industrial facilities are still quite rare, but not due the fact that their systems are well protected, but because they have no potential for financial gain. Cyberterrorists are potentially most interested in these kind of attacks, since they give publicity, while hacktivists driven by ideological motives can easily become their foot soldiers.

Dmitry Volkov

Dmitry Volkov

Co-Founder of Group-IB, Head of Group-IB’s
Investigation Department and Intelligence Service

The research has been carried out in close cooperation with Interpol.

More information about the investigation is available on Group-IB official blog: www.group-ib.com/blog/uicf

Report an incident

24/7 Incident Response Assistance +7 495 984-33-64

Thank you!
We will contact you soon.