AMAD UMAR AGHA & FIRAS DARDAR SYRIAN CYBER HACKERS CHARGED WITH MULTIPLE CONSPIRACIES RELATED TO COMPUTER HACKING

AMAD UMAR AGHA & FIRAS DARDAR SYRIAN CYBER HACKERS CHARGED WITH MULTIPLE CONSPIRACIES RELATED TO COMPUTER HACKING

User Rating: 1 / 5

Star ActiveStar InactiveStar InactiveStar InactiveStar Inactive
 
FROM THE - CHRONICLES of Monte Friesner – Criminal & Intelligence Analyst and Consulaire for WANTED SA~
~Contributed by FBI ~

 Published on March 23 2016

     

                                   Amad Umar Agha             Firas Dardar

                                                                     Amad Umar Agha                                                                               Firas Dardar

Syrian Cyber Hackers Charged
Two From ‘Syrian Electronic Army’ Added to Cyber’s Most Wanted

Three members of a Syrian hacker collective that hijacked the websites and social media platforms of prominent U.S. media organizations and the U.S. military were charged today in federal court with multiple conspiracies related to computer hacking.

In two criminal complaints unsealed in the Eastern District of Virginia, Amad Umar Agha, Firas Dardar, and Peter Romar were charged with criminal conspiracies related to their roles targeting Internet sites—in the U.S. and abroad—on behalf of the Syrian Electronic Army (SEA), a group of hackers that supports the regime of Syrian President Bashar al-Assad. The affected sites—which included computer systems in the Executive Office of the President in 2011 and a U.S. Marine Corps recruitment website in 2013—were deemed by SEA to be antagonistic toward the Syrian government.

According to the charges, Agha, 22, known online as “The Pro,” and Dardar, 27, engaged in a multi-year conspiracy that began in 2011 to collect usernames and passwords that gave them the ability to deface websites, redirect domains to sites controlled by the conspirators, steal e-mail, and hijack social media accounts. To obtain the login information they used a technique called “spear-phishing,” where they tricked people who had privileged access to their organizations’ websites and social media channels into volunteering sensitive information by posing as a legitimate entity.

The FBI today added Agha and Dardar—both believed to be in Syria—to its Cyber’s Most Wanted. The Bureau is offering a reward of up to $100,000 each for information that leads to their arrest; anyone with information is asked to contact the FBI or the nearest U.S. Embassy or consulate. Tips can also be submitted online at tips.fbi.gov.

                                       Agha Wanted Poster    Dardar wanted poster

Dardar, known online as “The Shadow,” also worked with Peter “Pierre” Romar, 36, on a scheme beginning in 2013 to extort U.S. businesses for profit. According to the complaint, the pair would hack into the victims’ computers and then threaten to damage computers, and delete or sell the data unless they were paid a ransom.

Other examples of the conspirators’ hacks include:

  • Compromising the Twitter account of a prominent U.S. media organization in 2013 and releasing a tweet claiming that a bomb had exploded at the White House and injured the President.
  • Gaining control of a U.S. Marine Corps recruiting website and posting a message urging Marines to “Refuse [their] orders.”

In a statement, Assistant Attorney General for National Security John Carlin said the conspirators’ extortion schemes undermine their own claims of working for a noble cause—to support the embattled regime of their president. “While some of the activity sought to harm the economic and national security of the United States in the name of Syria, these detailed allegations reveal that the members also used extortion to try to line their own pockets at the expense of law-abiding people all over the world,” Carlin said.

The U.S. District Court has issued arrest warrants for all three defendants. The FBI’s Washington Field Office (WFO) is investigating the case with assistance from the NASA Office of the Inspector General and Department of State Bureau of Diplomatic Security, and other law enforcement agencies.

“These three members of the Syrian Electronic Army targeted and compromised computer systems in order to provide support to the Assad regime as well as for their own personal monetary gain through extortion,” said WFO Assistant Director in Charge Paul M. Abbate. “As a result of a thorough cyber investigation, FBI agents and analysts identified the perpetrators and now continue to work with our domestic and international partners to ensure these individuals face justice in the United States.”

________________________________________________________________________________________________________________________

WANTED SA kindly thanks US Treasury, Kenneth Rijock, AFP, Reuters, BBC, Associated Press, DEA, FBI, ICE, Westlaw, Arutz Sheva, and all the Parties, Press, Journalists, Law Enforcement and Securities forces who have contributed to the many articles and their sincere opinions and statements. 

WANTED SA states that the facts and opinions stated in this article are those of the author and not those of WANTED SA. We do not warrant the accuracy of any of the facts and opinions stated in this article nor do we endorse them or accept any form of responsibility for the articles.