Due to a lot of work I skipped blogging here.
Mixed Postings, a lot of technical advice, activities, and how to earn money…
#OpISIS is one of the most interesting attempts to counter ISIS accounts technically – unfortunately ISIS will not disappear when the ISIS presence on the Web is gone, fighting ISIS ideology/theology will remain important. OpISIS published a list of websites hosted by providers like and others worldwide, exposing the negligence of the companies – or their interest in easy profit: Islamic State Website Hosting Company Archive
A list of 25.000 Twitter accounts related to ISIS has been released by another hacker by a counter-terrorist acrivist. The operations against the accounts identified can be followed, e. g., on Lucky Troll Club. If you are interest in a how-to guide by Anonymous, there are informations. And a crowdfunding campaign has started to supported these activities.
Why is this interesting for a blog focussing on Arab hackers? Ghostsec etc. are looking for Arab speaking speacilising to verify their findings of Arab language websites, the center of ISIS online activity.
Ghostsec has now: Target Websites down 119 and Target Accounts down 15,420.
There is still the opportunity to read non-electronic books. This one could be a good choice:
Makes you rethink some categories used analysing online actions….
There are some books worth reading. This is one:
An (interview with a SEA activist) about the Forbes hack in April demonstrates once again the close monitoring of English speaking media by the SEA for news items that are in their view anti-Syria, i.e., anti-Assad. Interesting is the attempt to cause credibility problems (from the article linked above):
„As Andy outlined, after the hackers gained access to our publishing platform, they posted potentially market-moving stories about fake pronouncements from new Fed chair Janet Yellen, rather than articles correcting the record on Syria. SEA Wr4th says they were a “diversion [from] the real operation.” “We needed time on the server with the superadmin logged,” he writes. “Otherwise its too suspicious for that much load.” In other words, they were hoping to ramp up our traffic to distract us from the exfiltration of information that was happening as they downloaded the database of information about our users. It included only their WordPress credentials: the usernames and hashed passwords needed to sign into the platform. The fake article ploy didn’t work as a traffic distraction. A Forbes editor spotted the fakes within five minutes and took them down.
As to why the group didn’t take the opportunity it had with control of the Forbes site to post articles about Syria that counter the narrative they object to, SEA Wr4th said, “There’s no point, you were taken down the articles immediately. We planned to write something, but the time window was too small.”
Another interesting hack of CNN:
A report on the SEA:
And capitalizing on the NSA etc discussions:
Reminds me (and others) of the ARAMCO hack: