{
	"id": "763d8a1a-8ef9-4bbe-bee6-0302ef11bca4",
	"created_at": "2026-04-06T00:06:17.790275Z",
	"updated_at": "2026-04-10T03:26:47.883587Z",
	"deleted_at": null,
	"sha1_hash": "a1b16b4d66b6defd553e7c3dbf2c916c65d82864",
	"title": "Syrian Electronic Army",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 266137,
	"plain_text": "Syrian Electronic Army\r\nBy Contributors to Wikimedia projects\r\nPublished: 2012-08-13 · Archived: 2026-04-05 14:53:21 UTC\r\nFrom Wikipedia, the free encyclopedia\r\nSyrian Electronic Army\r\nSyrian Electronic Army logo\r\nFormation 15 March 2011\r\n[1]\r\nDissolved Inactive 2021-2024 2024\r\nPurpose Promoting Pro-Assad Activism\r\nLocation Syria\r\nThe Syrian Electronic Army (SEA; Arabic: اإللكرتوني السوري الجيش (was a group of computer hackers which first\r\nsurfaced online in 2011 to support the government of former Syrian President Bashar al-Assad. Using spamming,\r\nwebsite defacement, malware, phishing, and denial-of-service attacks, it has targeted terrorist organizations,\r\npolitical opposition groups, western news outlets, human rights groups and websites that are seemingly neutral to\r\nthe Syrian conflict. It has also hacked government websites in the Middle East and Europe, as well as US defense\r\ncontractors. As of 2011, the SEA has been \"the first Arab country to have a public Internet Army hosted on its\r\nnational networks to openly launch cyber attacks on its enemies\".[2]\r\nThe precise nature of SEA's relationship with the Ba'athist Syria government changed over time and was unclear.\r\n[3]\r\nOrigins and historical context\r\n[edit]\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 1 of 9\n\nIn the 1990s, Syrian President Bashar al-Assad headed the Syrian Computer Society, which is connected to the\r\nSEA, according to research by University of Toronto and University of Cambridge, UK.[2] There is evidence that\r\na Syrian Malware Team goes as far back as January 1, 2011.[4] In February 2011, after years of Internet\r\ncensorship, Syrian censors lifted a ban on Facebook and YouTube.\r\n[2]\r\n In April 2011, only days after anti-regime\r\nprotests escalated in Syria, Syrian Electronic Army emerged on Facebook.[2] On May 5, 2011 the Syrian\r\nComputer Society registered SEA’s website (syrian-es.com).[2] Because Syria's domain registration authority\r\nregistered the hacker site, some security experts have written that the group was supervised by the Syrian state.[5]\r\nSEA claimed on its webpage to be no official entity, but \"a group of enthusiastic Syrian youths who could not stay\r\npassive towards the massive distortion of facts about the recent uprising in Syria\".[6] As soon as May 27, 2011\r\nSEA had removed text that denied it was an official entity.\r\n[2]\r\n One commentator has noted that \"[SEA] volunteers\r\nmight include Syrian diaspora; some of their hacks have used colloquial English and Reddit memes.[7] In July\r\n2011, it emerged that Bashar al-Assad's page on Facebook page was run by a member of the Syrian Electronic\r\nArmy close to the regime, Haidara Suleiman, the son of powerful intelligence officer and former Syrian\r\nambassador in Amman, Bahjat Suleiman.\r\n[8]\r\n He told AFP that \"the official media is unfortunately weak... This is\r\nwhy we use electronic media to show people what's going on.\"[8]\r\nAccording to a 2014 report by security company Intelcrawler, SEA activity has shown links with \"officials in\r\nSyria, Iran, Lebanon and Hezbollah.\"[9] A February 2015 article by The New York Times stated that \"American\r\nintelligence officials\" suspect the SEA is \"actually Iranian\".[10] However, no data has shown a link between Iran's\r\nand Syria's cyber attack patterns according to an analysis of \"open-source intelligence\" by cyber security firm\r\nRecorded Future.\r\n[11]\r\nSEA has pursued activities in three key areas:\r\nWebsite defacement and electronic surveillance against Syrian rebels and other opposition: The SEA has\r\ncarried out surveillance to discover the identities and location of Syrian rebels, using malware (including\r\nthe Blackworm tool),[4] phishing, and denial of service attacks. As of 2013 this electronic monitoring has\r\nextended to foreign aid workers.[12]\r\nDefacement attacks against Western websites that it contends spread news hostile to the Syrian\r\ngovernment: These have included news websites such as BBC News, the Associated Press, National Public\r\nRadio, CBC News,\r\n[13]\r\n Al Jazeera, Financial Times, The Daily Telegraph,\r\n[14]\r\n The Washington Post,\r\n[15]\r\nSyrian satellite broadcaster Orient TV, and Dubai-based al-Arabia TV,\r\n[16]\r\n as well as rights organizations\r\nsuch as Human Rights Watch.\r\n[17]\r\n SEA targets include VoIP apps, such as Viber[18] and Tango.\r\n[19]\r\nSpamming popular Facebook pages with pro-regime comments:[20] The Facebook pages of President\r\nBarack Obama and former French President Nicolas Sarkozy have been targeted by such spam campaigns.\r\n[21]\r\nGlobal cyber espionage: \"technology and media companies, allied military procurement officers, US\r\ndefense contractors, and foreign attaches and embassies\".[22]\r\nThe SEA's tone and style vary from the serious and openly political to ironic statements intended as critical or\r\npointed humor: SEA had \"Exclusive: Terror is striking the #USA and #Obama is Shamelessly in Bed with Al-https://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 2 of 9\n\nQaeda\" tweeted from the Twitter account of 60 Minutes, and in July 2012 posted \"Do you think Saudi and Qatar\r\nshould keep funding armed gangs in Syria in order to topple the government? #Syria,\" from Al Jazeera's Twitter\r\naccount before the message was removed. In another attack, members of SEA used the BBC Weather Channel\r\nTwitter account to post the headline, \"Saudi weather station down due to head on-collision with camel.\"[23] After\r\nWashington Post reporter Max Fisher called their jokes unfunny, one hacker associated with the group told a Vice\r\ninterview 'haters gonna hate.'\"[7]\r\nOn 31 October 2014, the SEA released a Linux distribution named SEANux.[24][25]\r\nTimeline of notable attacks\r\n[edit]\r\nJuly 2011: University of California Los Angeles website defaced by SEA hacker \"The Pro\".[26]\r\nAugust 2011: Anonymous-run social networking platform Anonplus is defaced. Citizen Lab attributes the\r\nattack to the Syrian Electronic Army.\r\n[27]\r\nSeptember 2011: The Harvard University website was defaced when an image was replaced with one of\r\nBashar al-Assad accompanied by the message \"Syrian Electronic Army were here\".[28]\r\nApril 2012: The official blog of social media website LinkedIn was redirected to a site supporting Bashar\r\nal-Assad.[29]\r\nAugust 2012: The Twitter account of the Reuters news agency sent 22 tweets with false information on the\r\nconflict in Syria. The Reuters news website was compromised, and posted a false report about the conflict\r\nto a journalist's blog.[30]\r\n23 April 2013: The Associated Press Twitter account falsely claimed the White House had been bombed\r\nand President Barack Obama injured. This led to a US$136.5 billion decline in value of the S\u0026P 500 the\r\nsame day.\r\n[31][32]\r\nMay 2013: The Twitter account of The Onion was compromised by phishing Google Apps accounts of The\r\nOnion's employees. The platform was also used by the hackers to spread pro-Syrian tweets.[33][34]\r\n24 May 2013: The ITV News London Twitter account was hacked.[35]\r\nOn 26 May 2013: the Android applications of British broadcaster Sky News were hacked on Google Play\r\nStore.[36]\r\n17 July 2013: Truecaller servers were hacked into by the Syrian Electronic Army.\r\n[37]\r\n The group claimed on\r\nits Twitter handle to have recovered 459 GiBs of database, primarily due to an older version of WordPress\r\ninstalled on the servers. The hackers released Truecaller's alleged database host ID, username, and\r\npassword via another tweet.[38] On 18 July 2013, TrueCaller confirmed on its blog that only their website\r\nwas hacked, but claimed that the attack did not disclose any passwords or credit card information.[39]\r\n23 July 2013: Viber servers were hacked, the support website replaced with a message and a supposed\r\nscreenshot of data that was obtained during the intrusion.[40][41][18]\r\n15 August 2013: Advertising service Outbrain suffered a spearphishing attack and SEA placed redirects\r\ninto the websites of The Washington Post, Time, and CNN.[42]\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 3 of 9\n\n27 August 2013: NYTimes.com had its DNS redirected to a page that displayed the message \"Hacked by\r\nSEA\" and Twitter's domain registrar was changed.[43]\r\n28 August 2013: Twitter's DNS registration showed the SEA as its Admin and Tech contacts, and some\r\nusers reported that the site's Cascading Style Sheets (CSS) had been compromised.[44]\r\n29–30 August 2013: The New York Times, The Huffington Post, and Twitter were knocked down by the\r\nSEA. A person claiming to speak for the group stepped forward to tie these attacks to the increasing\r\nlikelihood of U.S military action in response to al-Assad using chemical weapons. A self-described\r\noperative of the SEA told ABC News in an e-mail exchange: \"When we hacked media we do not destroy\r\nthe site but only publish on it if possible, or publish an article [that] contains the truth of what is happening\r\nin Syria. ... So if the USA launch attack on Syria we may use methods of causing harm, both for the U.S.\r\neconomy or other.\"[45]\r\n2–3 September 2013: Pro-Syria hackers broke into the Internet recruiting site for the US Marine Corps,\r\nposting a message that urged US soldiers to refuse orders if Washington decides to launch a strike against\r\nthe Syrian government. The site, www.marines.com, was paralyzed for several hours and redirected to a\r\nseven-sentence message \"delivered by SEA\".[46]\r\n30 September 2013: The Global Post's official Twitter account and website were hacked. SEA posted\r\nthrough their Twitter account, \"Think twice before you publish untrusted informations [sic] about Syrian\r\nElectronic Army\" and \"This time we hacked your website and your Twitter account, the next time you will\r\nstart searching for new job\"[47]\r\n28 October 2013: By gaining access to the Gmail account of an Organizing for Action staffer, the SEA\r\naltered shortened URLs on President Obama's Facebook and Twitter accounts to point to a 24-minute pro-government video on YouTube.\r\n[48]\r\n9 November 2013: SEA hacked the website of VICE, a no-affiliate news/documentary/blog website, which\r\nhas filmed numerous times in Syria with the side of the Rebel forces. Logging into vice.com redirected to\r\nwhat appeared to be the SEA home page.[49]\r\n12 November 2013: SEA hacked the Facebook page of Matthew VanDyke, a Libyan Civil War veteran and\r\npro-rebel news reporter.\r\n[citation needed]\r\n1 January 2014: SEA hacked Skype's Facebook, Twitter and blog, posting an SEA related picture and\r\ntelling users not to use Microsoft's e-mail service Outlook.com —formerly known as Hotmail—claiming\r\nthat Microsoft sells user information to the government.[50]\r\n11 January 2014: SEA hacked the Xbox Support Twitter pages and directed tweets to the group's website.\r\n[51]\r\n22 January 2014: SEA hacked the official Microsoft Office Blog, posting several images and tweeted about\r\nthe attack.[52]\r\n23 January 2014: CNN's HURACAN CAMPEÓN 2014 official Twitter account showed two messages,\r\nincluding a photo of the Syrian Flag composed of binary code. CNN removed the Tweets within 10\r\nminutes.[53][54]\r\n3 February 2014: SEA hacked the websites of eBay and PayPal UK. One source reported the hackers said\r\nit was just for show and that they took no data.[55]\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 4 of 9\n\n6 February 2014: SEA hacked the DNS of Facebook. Sources said the registrant contact details were\r\nrestored and Facebook confirmed that no traffic to the website was hijacked, and that no users of the social\r\nnetwork were affected.[56]\r\n14 February 2014: SEA hacked the Forbes website and their Twitter accounts.[57]\r\n26 April 2014: SEA hacked the information security-related RSA Conference website.[58]\r\n18 June 2014: SEA hacked the websites of British newspapers The Sun (United Kingdom) and The Sunday\r\nTimes.\r\n[59]\r\n22 June 2014: The Reuters website was hacked a second time and showed a SEA message condemning\r\nReuters for \"publishing false articles about Syria\". Hackers compromised the website, corrupting ads\r\nserved by Taboola.\r\n[60]\r\n27 November 2014: SEA hacked hundreds of sites through hijacking Gigya's comment system of\r\nprominent websites, displaying a message \"You've been hacked by the Syrian Electronic Army(SEA).\"\r\nAffected websites included the Aberdeen Evening Express, Logitech, Forbes, The Independent UK\r\nMagazine, London Evening Standard, The Telegraph, NBC, the National Hockey League, Finishline.com,\r\nPCH.com, Time Out New York and t3.com (a tech website), stv.com, Walmart Canada, PacSun, Daily Mail\r\nwebsites, bikeradar.com (cycling website), SparkNotes, millionshort.com, Milenio.com,\r\nMediotiempo.com, Todobebe.com and myrecipes.com, Biz Day SA, BDlive South Africa,\r\nmuscleandfitness.com, and CBC News.\r\n[61]\r\n21 January 2015: French newspaper Le Monde wrote that SEA hackers \"managed to infiltrate our\r\npublishing tool before launching a denial of service\".[62][63]\r\n17 May 2018: Two suspects were indicted by the United States for \"conspiracy\" for hacking several US\r\nwebsites.[64]\r\nOctober 2021: Facebook discovers the presence of several fake accounts run by the SEA and its affiliated\r\norganizations. The accounts had reportedly been used to target Syrian opposition figures and human rights\r\nactivists, as well as members of the YPG and White Helmets.\r\n[65][66]\r\n10 May 2016: Syrian Electronic Army member Peter Romar was extradited from Germany to the United\r\nStates to face charges brought by the Department of Justice for engaging in a \"a multi-year criminal\r\nconspiracy to conduct computer intrusions against perceived detractors of President Bashar al-Assad,\r\nincluding media entities, the White House and foreign governments.\"[67][68]\r\n28 September 2016: Peter Romar pled guilty to charges of helping the Syrian Electronic army extort cash\r\nfrom hacking victims.[69][70]\r\nAdvanced persistent threat\r\nHacktivism\r\nInternet censorship in Syria\r\nPLA Unit 61398\r\nTailored Access Operations\r\n1. ^ \"Syrian Electronic Army\". Syrian Electronic Army. Archived from the original on 1 September 2014.\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 5 of 9\n\n2. ^ Jump up to: a\r\n \r\nb\r\n \r\nc\r\n \r\nd\r\n \r\ne\r\n \r\nf\r\n Noman, Helmi (May 30, 2011). \"The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army\". Open Net\r\nInitiative. Retrieved 22 July 2013.\r\n3. ^ Perlroth, Nicole (17 May 2013). \"Hunting for Syrian Hackers' Chain of Command\". New York Times.\r\nRetrieved 22 July 2013.\r\n4. ^ Jump up to: a\r\n \r\nb\r\n Wilhoit, Kyle; Haq, Thoufique (August 29, 2014). \"Connecting the Dots: Syrian Malware\r\nTeam Uses BlackWorm for Attacks\". FireEye Inc, cyber security company. Archived from the original\r\n(blog) on October 26, 2014. Retrieved October 15, 2014.\r\n5. ^ Gallagher, Sean (May 8, 2013). \"Network Solutions seizes over 700 domains registered to Syrians\". Ars\r\nTechnica. Retrieved October 15, 2014. “The Syrian Computer Society acts as Syria's domain registration\r\nauthority and regulates the Internet within Syria, and is also believed to be connected to Syria's state\r\nsecurity apparatus. The Syrian Computer Society registered .sy domain names for the Syrian Electronic\r\nArmy's servers, giving the hacker group a national-level domain name (sea.sy) rather than a .com or other\r\nnon-government address, signifying its status as at least a state-supervised operation.”\r\n6. ^ Fowler, Sarah (April 25, 2013). \"Who is the Syrian Electronic Army?\". BBC News. Retrieved October\r\n15, 2014.\r\n7. ^ Jump up to: a\r\n \r\nb\r\n Peterson, Andrea (2013-08-15). \"The Post just got hacked by the Syrian Electronic Army.\r\nHere's who they are\". The Washington Post. Retrieved 2013-08-28.\r\n8. ^ Jump up to: a\r\n \r\nb\r\n Nahhas, Lynne (11 July 2011). \"Syria's secret war against the cyber dissidents\". AFP.\r\n9. ^ Robertson, Jordan. \"Three Things You Should Know About the Syrian Electronic Army\". No. 24 March\r\n2014. Bloomberg. Retrieved 2 February 2015.\r\n10. ^ Sanger, David E. (1 February 2015). \"Hackers Use Old Lure on Web to Help Syrian Government\". The\r\nNew York Times. New York Times. Retrieved 2 February 2015. “... the cybervandalism carried out in recent\r\nyears by the Syrian Electronic Army, which American intelligence officials suspect is actually Iranian, and\r\nhas conducted strikes against targets in the United States, including the website of The New York Times.”\r\n11. ^ King, Rachael (September 5, 2013). \"Data Shows No Link Between Syrian Electronic Army and Iran\".\r\nWall Street Journal. Retrieved 2 February 2015.\r\n12. ^ Perlroth, Nicole (17 May 2013). \"Hunting for Syrian hackers' Chain of Command\". New York Times.\r\nRetrieved 22 July 2013.\r\n13. ^ \"Syrian Electronic Army claims hack of news sites, including CBC\". CBC/Radio-Canada. 2014-11-27.\r\n14. ^ Love, Dylan (22 May 2013). \"10 Reasons to Worry About the Syrian Electronic Army\". Business Insider.\r\nRetrieved 22 July 2013.\r\n15. ^ \"Editor's note\". The Washington Post. August 15, 2013. Retrieved August 15, 2013.\r\n16. ^ \"Syrian Electronic Army: Disruptive Attacks and Hyped Targets\", OpenNet Initiative, 25 June 2011\r\n17. ^ \"NPR.org Hacked; 'Syrian Electronic Army' Takes Responsibility\". NPR. 2013-04-16. Retrieved 2013-\r\n04-16.\r\n18. ^ Jump up to: a\r\n \r\nb\r\n Crook, Jordan (2013-07-23). \"Viber Attacked By Syrian Electronic Army\". TechCrunch.\r\nRetrieved 2019-03-08.\r\n19. ^ Rubenking, Neil J. (2013-07-23). \"Syrian Electronic Army Hacked Tango Chat App; Is Your Site Next?\".\r\nPC Magazine. Retrieved 2019-03-08.\r\n20. ^ Abbas, Mohammed (June 21, 2012). \"Syria activists using U.S. tech to beat curbs\". Reuters. Retrieved\r\nJune 21, 2012.\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 6 of 9\n\n21. ^ Sarah Fowler \"Who is the Syrian Electronic Army?\", BBC News, 25 April 2013\r\n22. ^ \"Syrian Electronic Army - Hacktivision to Cyber Espionage?\" (PDF). intelcrawler.com. IntelCrawler\r\n(PGP). 20 March 2014. p. 94. Retrieved 22 March 2015.\r\n23. ^ Schroeder, Audra (2013-05-02). \"Is it time to start taking the Syrian Electronic Army seriously?\". The\r\nDaily Dot. Retrieved 2013-08-28.\r\n24. ^ \"SEANux - a version of Linux from the Syrian Electronic Army\". Graham Cluley. Cluley Associates. 13\r\nOctober 2014. Retrieved 14 November 2014.\r\n25. ^ SyrianElectronicArmy (31 October 2014). \"#SEANux is now released and available for download!\"\r\n(Twitterfeed).\r\n26. ^ Sterling, Bruce (6 July 2011). \"Syrian Electronic Army Invades University of California Los Angeles\".\r\nWired. Retrieved 10 September 2013.\r\n27. ^ Keizer, Gregg (2011-08-08). \"Syrian hackers retaliate, deface Anonymous' social network\".\r\nComputerworld. Retrieved 2023-01-03.\r\n28. ^ Coughlan, Sean (26 September 2011). \"Harvard website hacked by Syria protesters\". BBC. Retrieved 10\r\nSeptember 2013.\r\n29. ^ Holt, Kris (26 April 2012). \"Syrian hackers take down LinkedIn's official blog\". The Daily Dot. Retrieved\r\n10 September 2013.\r\n30. ^ Howell, Martin (5 August 2012). \"Reuters Twitter account hacked, false tweets about Syria sent\".\r\nReuters. Retrieved 10 September 2013.\r\n31. ^ Spillus, Alex \"Who is the Syrian Electronic Army?\", The Telegraph, 24 April 2013\r\n32. ^ Peter Foster \"'Bogus' AP tweet about explosion at the White House wipes billions off US markets\", The\r\nTelegraph, 23 April 2013\r\n33. ^ \"The Onion's Suspected Twitter Hack Reveals The Syrian Electronic Army's Morbid Humor\".\r\nTechCrunch. 6 May 2013. Retrieved 2022-02-01.\r\n34. ^ \"How the Syrian Electronic Army Hacked The Onion\", Tech Team, The Onion, 8 May 2013\r\n35. ^ \"ITV News Twitter account hacked by Syrian Electronic Army\". Reuters. May 24, 2013. Retrieved 22\r\nMarch 2015. “Just kidding. The Syrian Electronic Army was here. ”\r\n36. ^ Richard Chirgwin (26 May 2013). \"Sky News Google Play page defaced\". The Register. Situation\r\nPublishing. Retrieved 22 March 2015.\r\n37. ^ \"Truecaller Database hacked by Syrian Electronic Army\" Archived 2013-07-20 at the Wayback Machine,\r\nSabari Selvan, E Hacking News, 17 July 2013.\r\n38. ^ \"TrueCaller hacked, 1 million Indians’ data at risk\", The Times of India, 18 July 2013.\r\n39. ^ \"Truecaller Statement\" Archived 2013-07-20 at the Wayback Machine, True Software Scandinavia AB,\r\n18 July 2013.\r\n40. ^ \"Phone and texting app ‘Viber’ hacked by Syrian Electronic Army\", Scott Buscemi, 9to5Mac, 23 July\r\n2013. Retrieved 24 July 2013.\r\n41. ^ \"Free calling app 'Viber' website defaced; database hacked by SEA\", Mohit Kumar, The hacker News, 23\r\nJuly 2013. Retrieved 24 July 2013.\r\n42. ^ \"Syrian hackers Use Outbrain to Target The Washington Post, Time, and CNN\" Archived 2013-10-19 at\r\nthe Wayback Machine, Philip Bump, The Atlantic Wire, 15 August 2013. Retrieved 15 August 2013.\r\n43. ^ Choney, Suzanne (August 28, 2013). \"New York Times hacked, Syrian Electronic Army suspected\". NBC\r\nNews. Retrieved 2013-08-28.\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 7 of 9\n\n44. ^ \"Syrian Electronic Army Claims It's Taken Over Twitter's Domain (Updated)\". Gizmodo. 2013-08-27.\r\nRetrieved 2013-08-28.\r\n45. ^ Syria's cyber retaliation signals new era of warfare, USA Today\r\n46. ^ \"US Marines website hacked – Indistan News\". Archived from the original on 24 September 2015.\r\nRetrieved 14 November 2014.\r\n47. ^ \"GlobalPost hacked by the Syrian Electronic Army\". GlobalPost. Retrieved 14 November 2014.\r\n48. ^ Paulson, Amanda (29 October 2013). \"Syrian Electronic Army says it hacked Obama accounts\".\r\nChristian Science Monitor. Retrieved 5 November 2013.\r\n49. ^ Jha, Abhishek Kumar (9 November 2013). \"Syrian Electronic Army hacks, 'vice.com' website redirected\r\nto SEA official Website\". TechWorm.\r\n50. ^ Shira Ovide (1 January 2014). \"Skype Social Media Accounts Hacked by Syrian Electronic Army\". Wall\r\nStreet Journal. Dow Jones. Retrieved 22 March 2015.\r\n51. ^ Mandalia, Ravi (11 January 2014). \"SEA hijacks official Xbox Support Twitter account\".\r\nTechienews.co.uk. Retrieved 12 January 2014.\r\n52. ^ Lucian Constantin (21 January 2014). \"Syrian Electronic Army hacks Microsoft's Office Blogs site mere\r\nhours after redesign\". PCWorld. Retrieved 14 November 2014.\r\n53. ^ Winograd, David (24 January 2014). \"CNN Sites Get Hacked\". Time. Retrieved 24 January 2014.\r\n54. ^ Catherine E. Shoichet (January 23, 2014). \"Some CNN social media accounts hacked\". CNN. Retrieved\r\nJanuary 23, 2014.\r\n55. ^ \"Syrian Electronic Army hacks Paypal and eBay websites\". Archived from the original on February 22,\r\n2014. Retrieved 14 November 2014.\r\n56. ^ Mohit Kumar (6 February 2014). \"Facebook domain hacked by Syrian Electronic Army\". The hacker\r\nNews - Biggest Information Security Channel. Retrieved 14 November 2014.\r\n57. ^ Eduard Kovacs (14 February 2014). \"Forbes Hacked by Syrian Electronic Army [Updated]\". softpedia.\r\nRetrieved 14 November 2014.\r\n58. ^ Brandon Stosh (29 April 2014). \"Syrian Electronic Army Hacked and Defaced RSA Conference Website -\r\nFreedom hacker\". Freedom hacker. Retrieved 14 November 2014.\r\n59. ^ \"SyrianElectronicArmy on Twitter\". Twitter. Retrieved 14 November 2014.\r\n60. ^ Payne, Samantha (22 June 2014). \"Reuters Hacked by Syrian Electronic Army via Taboola Ad\".\r\nInternational Business Times. Retrieved 23 June 2014.\r\n61. ^ Brandon Stosh (27 November 2014). \"Syrian Electronic Army Hacks Forbes, Ferrari, Daily Telegraph,\r\nIndependent, Intel Among Hundreds of Others\". Freedom hacker - Breaking Hacking and Security News.\r\nRetrieved 27 November 2014.\r\n62. ^ Samuel, Henry (21 January 2015). \"Le Monde hacked: 'Je ne suis pas Charlie' writes Syrian Electronic\r\nArmy\". Retrieved 23 March 2016.\r\n63. ^ \"The hackers managed to infiltrate our publishing tool before launching a denial of service\". Reuters. 21\r\nJanuary 2015. Archived from the original on February 1, 2015. Retrieved 21 January 2015.\r\n64. ^ \"Two Members of Syrian Electronic Army Indicted for Conspiracy\". 17 May 2018.\r\n65. ^ Culliford, Elizabeth (2021-11-16). \"Facebook says hackers in Pakistan targeted Afghan users amid\r\ngovernment collapse\". Reuters. Retrieved 2022-02-01.\r\n66. ^ \"Hackers in Syria, Pakistan taken down by Meta after sustained cyber attacks\". Middle East Monitor.\r\n2021-11-18. Retrieved 2022-02-01.\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 8 of 9\n\n67. ^ \"Syrian Electronic Army Member Extradited to the United States\". www.justice.gov. 2016-05-10.\r\nRetrieved 2022-05-03.\r\n68. ^ Nakashima, Ellen (2016-05-09). \"Syrian hacker extradited to the United States from Germany\".\r\nWashington Post. ISSN 0190-8286. Retrieved 2022-05-03.\r\n69. ^ \"Guilty plea for Syrian Electronic Army accomplice\". BBC News. 2016-09-30. Retrieved 2022-10-10.\r\n70. ^ Weiner, Rachel (2016-09-28). \"Syrian refugee pleads guilty in hacking scheme; FBI says masterminds\r\nstill at large\". Washington Post. ISSN 0190-8286. Retrieved 2022-10-10.\r\nSyrian Electronic Army on X old account\r\nYoutube Channel\r\nPinterest profile of the Syrian Electronic Army\r\nVK profile of the Syrian Electronic Army\r\nsyrianelectronicarmy.com, first SEA website which was later[when?] redirected to its .sy replacement\r\nsea.sy, SEA's newer website, which SEA started in late May 2013; it has its access revoked by the Syrian\r\nComputer Society (site displays blank loading page on browser, and widget returns \"ERROR 403:\r\nForbidden\" as of August 2013)\r\nThe Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of\r\nthe Syrian Electronic Army, Helmi Noman, May 30, 2011, published by Information Warfare Monitor, a\r\npublic-private partnership between University of Ottawa and Secdev Group, including screenshots of SEA\r\nactivities.\r\ngoogle cache of an SEA website mentioned in Information Warfare Monitor report citing\r\n\"syrian.es.sy\" email ID as a contact address and links to a Facebook page named \"Vict0r Battalion -\r\nSyrian Electronic Army\". The page is no longer available starting from September 2013.\r\nUnderstanding the Syrian Electronic Army (SEA), HP-Security Research Blog\r\nSyrian Cyber Hackers Charged - Two From ‘Syrian Electronic Army’ Added to Cyber’s Most Wanted\r\n(FBI)\r\nSource: https://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nhttps://en.wikipedia.org/wiki/Syrian_Electronic_Army\r\nPage 9 of 9",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"MISPGALAXY",
		"ETDA"
	],
	"references": [
		"https://en.wikipedia.org/wiki/Syrian_Electronic_Army"
	],
	"report_names": [
		"Syrian_Electronic_Army"
	],
	"threat_actors": [
		{
			"id": "2f498e6b-3f0e-4f26-8cc7-52121e675643",
			"created_at": "2023-01-06T13:46:38.447274Z",
			"updated_at": "2026-04-10T02:00:02.978901Z",
			"deleted_at": null,
			"main_name": "Deadeye Jackal",
			"aliases": [
				"SyrianElectronicArmy"
			],
			"source_name": "MISPGALAXY:Deadeye Jackal",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "cf7fc640-acfe-41c4-9f3d-5515d53a3ffb",
			"created_at": "2023-01-06T13:46:38.228042Z",
			"updated_at": "2026-04-10T02:00:02.883048Z",
			"deleted_at": null,
			"main_name": "APT1",
			"aliases": [
				"PLA Unit 61398",
				"Comment Crew",
				"Byzantine Candor",
				"Comment Group",
				"GIF89a",
				"Group 3",
				"TG-8223",
				"Brown Fox",
				"ShadyRAT",
				"G0006",
				"COMMENT PANDA"
			],
			"source_name": "MISPGALAXY:APT1",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "76fc6d92-0710-4640-bfa7-3000fe3940a5",
			"created_at": "2022-10-25T16:07:24.251595Z",
			"updated_at": "2026-04-10T02:00:04.911951Z",
			"deleted_at": null,
			"main_name": "Syrian Electronic Army (SEA)",
			"aliases": [
				"ATK 196",
				"Deadeye Jackal",
				"Syria Malware Team",
				"Syrian Electronic Army",
				"TAG-CT2"
			],
			"source_name": "ETDA:Syrian Electronic Army (SEA)",
			"tools": [
				"AndoServer",
				"CypherRat",
				"SLRat",
				"SandroRAT",
				"SilverHawk",
				"SpyNote",
				"SpyNote RAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775433977,
	"ts_updated_at": 1775791607,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/a1b16b4d66b6defd553e7c3dbf2c916c65d82864.pdf",
		"text": "https://archive.orkl.eu/a1b16b4d66b6defd553e7c3dbf2c916c65d82864.txt",
		"img": "https://archive.orkl.eu/a1b16b4d66b6defd553e7c3dbf2c916c65d82864.jpg"
	}
}