Syrian Electronic Army put at top of FBI's Most Wanted list

$100,000 reward for SEA hackers known as 'Th3 Pr0' and 'The Shadow'

Two members of the Syrian Electronic Army have been placed at the top of the FBI's list of most wanted cyber criminals.

The agency is offering a reward of up to $100,000 (70,583) each for information leading to the arrest of Ahmad Al Agha, who goes by the online handle of 'Th3 Pr0', and Firas Dardar, otherwise know as 'The Shadow'.

Dardar and Al Agha are both wanted in connection with "dozens of cyber attacks against United States government agencies, media organisations, and private organisations". Dardar is also suspected of orchestrating a number of online extortion schemes.

The pair are believed to operate on behalf of the Syrian Electronic Army, a cyber terrorism group with nebulous ties to the regime of Syrian dictator Bashar Al-Assad.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

Although the group has undertaken numerous operations in support of the Syrian government, the relationship between the two has never been explicitly confirmed, and opinion remains divided as to whether it is officially sanctioned.

"While some of the activity sought to harm the economic and national security of the United States in the name of Syria," assistant attorney general for National Security John P Carlin said. "These detailed allegations reveal that the members also used extortion to try to line their own pockets at the expense of law-abiding people all over the world."

"The allegations in the complaint demonstrate that the line between ordinary criminal hackers and potential national security threats is increasingly blurry."

Al Agha and Dardar have joined the list ahead of other cyber-criminals, including Eastern European racketeers and three members of the Chinese army.

People's Liberation Army officers Sun Kailiang, Huang Zhenyu and Wen Xinyu are charged with breaking into US companies' networks for the benefit of state-owned Chinese rivals.

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now
Advertisement

Recommended

Visit/security/internet-security/354417/avast-and-avg-extensions-pulled-from-chrome
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019

Most Popular

Visit/business-strategy/mergers-and-acquisitions/354602/xerox-to-nominate-directors-to-hps-board-reports
mergers and acquisitions

Xerox to nominate directors to HP's board – reports

22 Jan 2020
Visit/operating-systems/25802/17-windows-10-problems-and-how-to-fix-them
operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
Visit/business-strategy/public-sector/354608/uk-gov-launches-ps300000-sen-edtech-initiative
public sector

UK gov launches £300,000 SEN EdTech initiative

22 Jan 2020
Visit/web-browser/30394/what-is-http-error-503-and-how-do-you-fix-it
web browser

What is HTTP error 503 and how do you fix it?

7 Jan 2020