Following a series of high-profile Web site defacement and social media attack campaigns largely relying on the utilization of good-old-fashioned social engineering attack campaigns - it appears that the individuals behind the Syrian Electronic Army are now part of FBI's Most Wanted Cyber Watch List which means that I've decided to conduct an OSINT analysis further sharing actionable intelligence behind the group operators with the idea to assist law enforcement and the U.S Intelligence Community with the necessary data which could lead to a successful tracking down and prosecution of the team behind these campaigns.
In this post I'll provide actionable intelligence on the group behind the Syrian Electronic Army including actionable intelligence on the infrastructure on some of their most prolific social engineering driven campaigns.
Sample Personal Photo of Ahmad Al Agha:
Related domains known to have participated in the campaign:
Related IPs known to have participated in the campaign:
Social Media Accounts:
Skype account IDs known to have participated in the campaign:
Related emails known to have participated in the campaign:
We'll continue monitoring the campaign and post updates as soon as new developments take place.