ManageEngine OpManager, a powerful NMS for monitoring your network, physical & virtual (VMware/ HyperV) servers & other IT devices. Deploy and start monitoring in less than an hour. Trusted by over a million admins world-wide. Try it for free.
The Obama administration has authorized a new online campaign in its slow, grinding war against ISIS, The New York Times reported earlier this week. The Pentagon's Cyber Command will target ISIS in a way that essentially will get inside the heads of terrorist commanders to disrupt their military operations.
The goal appears to be to sow mistrust and confusion among ISIS leaders by interfering with their ability to pay their soldiers, execute operational orders, recruit new fighters, and communicate with one other.The plan amounts to dropping cyberbombs on the enemy, Deputy Secretary of Defense Robert O. Work told the Times, which is something the U.S. never before has done in such a large-scale battlefield environment.
Domestic Concerns
In many ways, the U.S. is living in a pre-cyber-disaster world, observedGreatHorn CEO Kevin O'Brien. That is, it has not suffered a crippling large-scale cyberattack from a foreign entity."We have not yet seen a cyberattack take down the power grid, disrupt critical infrastructure, or -- so far as we know -- gain access to military secrets," O'Brien told TechNewsWorld. "However, it is likely a matter of time before we see one of these events take place. There are routes through our cyberdefenses that are largely unsecured."
For example, ISIS last year gained access to the Twitter accounts of U.S. Central Command, O'Brien noted.
"While this was essentially Web vandalism, one can imagine a scenario where instead of posting propaganda pictures, they used their access to begin a more sophisticated, longer-term, and insidious social engineering attack against targets both public and private," he suggested.
Federal prosecutors just last month charged seven Iranians working for two companies sponsored by the Iranian government, ITSECTeam and Mersad, with a series of crimes against U.S. financial institutions that resulted in losses of tens of millions of dollars.
The suspects between 2011 and 2013 allegedly used botnets and other malicious computer code to carry out distributed Denial of Service attacks on nearly 50 financial institutions, preventing victims from gaining online access to their bank accounts.
One of the suspects, Hamid Firoozi, allegedly gained access to the Supervisory Control and Data Acquisition systems of the Bowman Dam in Rye, N.Y., in 2013.
Separately, federal prosecutors last month charged three members of the Syrian Electronic Army, a pro-Assad hacker collective, with spearphishing attacks against U.S. media organizations, a U.S. Marine Corp recruitment site, and the Executive Office of the President.
The Defense Department did not respond to our request to comment for this