Anonymous Cyber Attack On ISIS And What Can Anonymous Do Against ISIS

It seems like Anonymous has taken ISIS response very seriously and the group has started carrying out their attacks against the terror organisation and declared a “war” against ISIS



Anonymous First 'Cyber Attack' on ISIS: Soon after its war declaration, Anonymous claimed to have taken down more than 5,500 pro-ISIS Twitter accounts in #OpParis (Operation Paris).

In the past, hackers and organizations associated with Anonymous brought down websites allegedly connected with ISIS and claimed to have taken down thousands of ISIS accounts, disrupting their social media recruitment efforts.


What Is ISIS

ISIS is a terrorist organisation whose most interesting aspect is how it leverages the huge power of Twitter and Facebook to radicalize young people, spread its message around the globe, recruit foreign supporters to its fight and shock people into taking notice of its actions.
Many ISIS militants maintain extremely active accounts on the popular social media platforms. They also have a strong presence on the most popular encrypted messaging app Telegram with more than 100,000 followers. According to The Atlantic, there were more than 46,000 ISIS-affiliated Twitter accounts with an average of 1,000 followers each.
The group has also established a 24-hour Jihadi Help Desk to help its foot soldiers spread their message around the world, recruit followers and launch more terror attacks on foreign soil, NBC reports.



How Can Anonymous Defeat ISIS

When taking into consideration ISIS's extensive presence on Twitter, taking down its social media presence is the actual key to defeating the terror group, and it does make an impact at worst.
So, taking down the group's 5,500 Twitter accounts could be the first step towards disrupting ISIS online.
Now that Anonymous has declared cyberwar against the so-called Islamic State in retaliation for the Paris terrorist attacks, the question becomes: What can the hacker group actually do?
Taking over and shutting down Twitter accounts is a logical first step. But the real prize, experts say, is in fundamentally disrupting the militant group's recruiting mechanism. ISIS pitches its radical Islamist message through e-mail, Web chat, Skype calls and YouTube videos, and more recently it promoted a mobile messaging app called Telegram.
An Anonymous spokesman in a trademark Guy Fawkes mask said in a still unverified YouTube clip that the group "will launch the biggest ever operation" against ISIS, according to transcripts of the French video.
Anonymous, a 12-year-old virtual community that's been linked to hacks on everything from the government of Zimbabwe and Bay Area Rapid Transit to Visa, MasterCard and the Federal Reserve, has proven plenty capable of following through with its threats.
One approach Anonymous could take is to shut down online accounts and thus undermine ISIS' recruiting tools. Another is to embarrass ISIS by publishing evidence of the hypocrisy among its leaders, said Jonathan Sander, vice president of product strategy at cyber security company Lieberman Software. Let’s wait and see what happens next


Anonymous recently released 3 books on Hacking, literally we can call them guides after the attack on paris

1)      Noob Guide
2)      Reporter Guide
3)      Searcher Guide



The Noob Guide:  It explains everything about hacking, how to hack, what kind of tools should be used to hack, how to crack a password, use of VPN, proxy, tor , DDOS, Wifi Deauth and various other hacking terms,   This is the best Guide for Beginners who want to learn hacking. Anyone can get a brief picture of ways of hacking by reading this book

This is from Noob Guide


Reporter Guide: It covers launching a reporter bit against a list of twitter account ID’s for discovering, reporting, and taking down ISIS- related accounts

----------
References
----------
Twitter Reporter  >>>   https://ghostbin.com/paste/pjuox
Primary Targets   >>>   https://ghostbin.com/paste/fgrfx
Python Language   >>>   https://www.python.org/downloads
Splinter Module   >>>   http://num.to/guide/718262837890

The bot has been modified to report account IDs rather than usernames.
This allows the retainment of users who change their usernames often.
Make sure that your connection is protected, preferably using a VPN.

This tutorial will NOT work on Mac OS X due to incompatibility.

Instructions:
1.        Create an anonymous twitter account (unrelated to your identity).

2.        Download the Twitter Reporter (save as TR5.py) and the Primary Targets as raw text, and place both on your Desktop. Windows users should also download Python. Link at the top.

3.       Install the Splinter module. Link can be found above (supports Python 2.5 — 2.7 only).

4.       Open Terminal (or CMD on Windows) and type (without quotes) "cd Desktop"

5.       Type the following command and replace TWITTER with your own anonymous twitter username.
                                    "python TR5.py -u TWITTER -i 5K.txt"
6.       Enter your anonymous twitter credentials.

                       Check It Out 


Searcher Guide: It shows how people can help anonymous find more ISIS websites/pages and other ISIS related information.


This Is from Searcher Guide
This is an instructable on using the correct search terms to find ISIS-related links. If you follow it correctly and verify that the sites you have found are related to ISIS, please submit them, thx!
1.       Get Python at https://www.python.org/downloads/  unless you already have it (Mac does)
2.      Open Terminal (or Command Prompt for Windows) and type (without quotes) "python"
3.       Now, this step requires a little explanation. Let's set this out neatly, shall we...
·         Copy the contents of the following link to your clipboard https://ghostbin.com/paste/oo4tb
• The contents of that link are some search terms that relate to ISIS and their content, following you to narrow down the results to specific ones.
            • Paste the strings into the Terminal and press Enter
4.      Choose a couple of strings (3 recommended) from the list of strings. For this example we will use strings 3+38+46
5.      Once chosen, continue in terminal (without quotes) "print(str3+str38+str42)" and copy the results
6.      Paste the results in  https://www.google.iq  and analyze the new results
To translate pages, it is recommended to use Google Chrome, which has integrated      translation
7.      Submit any valid ones to one of the channel operators and we will deal with the info accordingly

              Check It Out 


 Check out my Related Articles on Anonymous:

Anonymous Released 3 How To Hack Guides Against ISIS

CloudFlare is Accused by Anonymous of Helping ISIS



Bhanu Namikaze

Bhanu Namikaze is an Ethical Hacker, Security Analyst, Blogger, Web Developer and a Mechanical Engineer. He Enjoys writing articles, Blogging, Debugging Errors and Capture the Flags. Enjoy Learning; There is Nothing Like Absolute Defeat - Try and try until you Succeed.

No comments:

Post a Comment