Cybersecurity

DOJ charges three Syrian Electronic Army hackers

sphere of binary data

Three Syrian nationals with ties to the Syrian Electronic Army have been charged with multiple hacking-related conspiracies, and warrants have been issued for their arrest, according to two U.S. Eastern District Court of Virginia criminal complaints that were unsealed March 22.

Ahmad Agha, 22, known under the online alias "Th3 Pr0," and Firas Dardar, 27, known under the online alias "The Shadow," were charged with criminal conspiracy that include "engaging in a hoax regarding a terrorist attack; attempting to cause mutiny of the U.S. armed forces; illicit possession of authentication features; access device fraud; unauthorized access to, and damage of, computers; and unlawful access to stored communications."

The two have been added to the FBI's Cyber Most Wanted list and are believed to be based within Syria. The FBI is offering a $100,000 reward for information that leads to their arrest.

Dardar and Peter Romar, 36, were separately charged with criminal conspiracies relating to "unauthorized access to, and damage of, computers and related extortionate activities; receiving the proceeds of extortion; money laundering; wire fraud; violations of the Syrian Sanctions Regulations; and unlawful interstate communications," according to the Justice Department.

The Syrian Electronic Army, which is alleged to have been involved in numerous infamous cyber breaches since 2011, has been described by the FBI as "a group of computer hackers responsible for computer intrusions intended to punish perceived detractors of" embattled Syrian President Bashar al-Assad.

The cyber syndicate allegedly used spear-phishing techniques to compromise security systems of the U.S. government, media organizations, private-sector companies and social media pages, including Marines.com, The New York Post, NPR, Vice and The Onion among others.

Additionally, the group allegedly stole usernames and passwords, hijack email and social media accounts and hacked highly trafficked websites. Perhaps its most high-profile alleged hacking took place in 2013 when the group breached the Associated Press Twitter account and tweeted that President Barack Obama had been injured in an explosion at the White House, which resulted in a brief but sharp drop in the U.S. stock market.

Court documents reveal that the three were caught when investigators linked a Gmail account, an IP address belonging to Syrian Telecom and a mobile phone number. Gmail correspondences addressed to and from both Agha and Dardar, revealed images of the hackers and Google searches and digital forensics left by the breaches were traced to the Gmail account and IP addresses. Hacks of LinkedIn and Washington Post Live were also traced to the IP addresses also registered to Syrian Telecom.

About the Author

Chase Gunter is a former FCW staff writer.

Featured

  • Cybersecurity
    Boy looks under voting booth at Ventura Polling Station for California primary Ventura County, California. Joseph Sohm / Shutterstock.com

    FBI breach notice rules lauded by states, but some want more

    A recent policy change by the FBI would notify states when their local election systems are hacked, but some state officials and lawmakers want the feds to inform a broader range of stakeholders in the election ecosystem.

  • paths (cybrain/Shutterstock.com)

    Does strategic planning help organizations?

    Steve Kelman notes growing support for strategic planning efforts -- and the steps agencies take to keep those plans relevant.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.