{
	"id": "c8d424e2-bd42-4c4f-9bf2-10e4fd4a7cb1",
	"created_at": "2026-04-07T02:19:59.249558Z",
	"updated_at": "2026-04-10T13:11:28.871216Z",
	"deleted_at": null,
	"sha1_hash": "c403518d43b936b6e052cd192a4aba8596e92375",
	"title": "Two Members of Syrian Electronic Army Indicted for Conspiracy",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 36872,
	"plain_text": "Two Members of Syrian Electronic Army Indicted for Conspiracy\r\nPublished: 2018-05-17 · Archived: 2026-04-07 02:04:28 UTC\r\nALEXANDRIA, Va. – A federal grand jury returned an 11-count indictment today charging two Syrian men with\r\noffenses relating to their participation in a conspiracy to engage in computer hacking as members of the “Syrian\r\nElectronic Army” or “SEA.”\r\nAhmad ‘Umar Agha, who is known online as the “The Pro,” and Firas Dardar, who uses the nickname “The\r\nShadow,” were indicted on conspiracy charges and multiple counts of aggravated identity theft.\r\nAccording to allegations in the indictment, under the name “Syrian Electronic Army,” the conspirators focused on\r\nspearphishing U.S. government, military, international organizations, and private-sector entities, including the\r\nExecutive Office of the President, the U.S. Marine Corps, the National Aeronautics and Space Administration,\r\nNational Public Radio, the Associated Press, Reuters, The Washington Post, The New York Times, CNN, The\r\nOnion, USA Today, The New York Post, Time, Human Rights Watch, and scores of other entities and individuals.\r\nAgha and Dardar would research targets and then engage in dedicated spearphishing attacks on victim\r\norganizations. When the conspiracy’s spearphishing efforts were successful, Agha and Dardar allegedly would use\r\nstolen usernames and passwords to deface websites, redirect domains to sites controlled or utilized by the\r\nconspiracy, steal electronic mail, and hijack social media accounts.\r\nThe alleged offenses of conspiracy and conspiracy to commit wire fraud carry maximum prison terms of 5 and 20\r\nyears in prison, respectively, and the alleged aggravated identity theft charges carry a collective mandatory prison\r\nterm of 2 years in prison and a maximum 18 years in prison. Actual sentences for federal crimes are typically less\r\nthan the maximum penalties. A federal district court judge will determine any sentence after taking into account\r\nthe U.S. Sentencing Guidelines and other statutory factors.\r\nTracy Doherty-McCormick, Acting U.S. Attorney for the Eastern District of Virginia, John C. Demers, Assistant\r\nAttorney General for National Security, and Nancy McNamara, Assistant Director in Charge of the FBI’s\r\nWashington Field Office, made the announcement after the indictment was returned.\r\nThe case was investigated by the FBI’s Washington Field Office with assistance from other law enforcement\r\nagencies including the NASA Office of the Inspector General. Assistant U.S. Attorneys Jay V. Prabhu and Maya\r\nD. Song, and Trial Attorneys Scott McCulloch, Nathan Charles, and Brandon Van Grack of the Justice\r\nDepartment’s National Security Division are prosecuting the case.\r\nA copy of this press release is located on the website of the U.S. Attorney’s Office for the Eastern District of\r\nVirginia. Related court documents and information is located on the website of the District Court\r\nhttps://www.justice.gov/usao-edva/pr/two-members-syrian-electronic-army-indicted-conspiracy\r\nPage 1 of 2\n\nfor the Eastern District of Virginia or on PACER\r\nby searching for Case No. 1:18-cr-221.\r\nAn indictment contains allegations that a defendant has committed a crime. Every defendant is presumed to be\r\ninnocent until and unless proven guilty in court.\r\nSource: https://www.justice.gov/usao-edva/pr/two-members-syrian-electronic-army-indicted-conspiracy\r\nhttps://www.justice.gov/usao-edva/pr/two-members-syrian-electronic-army-indicted-conspiracy\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.justice.gov/usao-edva/pr/two-members-syrian-electronic-army-indicted-conspiracy"
	],
	"report_names": [
		"two-members-syrian-electronic-army-indicted-conspiracy"
	],
	"threat_actors": [
		{
			"id": "76fc6d92-0710-4640-bfa7-3000fe3940a5",
			"created_at": "2022-10-25T16:07:24.251595Z",
			"updated_at": "2026-04-10T02:00:04.911951Z",
			"deleted_at": null,
			"main_name": "Syrian Electronic Army (SEA)",
			"aliases": [
				"ATK 196",
				"Deadeye Jackal",
				"Syria Malware Team",
				"Syrian Electronic Army",
				"TAG-CT2"
			],
			"source_name": "ETDA:Syrian Electronic Army (SEA)",
			"tools": [
				"AndoServer",
				"CypherRat",
				"SLRat",
				"SandroRAT",
				"SilverHawk",
				"SpyNote",
				"SpyNote RAT"
			],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775528399,
	"ts_updated_at": 1775826688,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/c403518d43b936b6e052cd192a4aba8596e92375.pdf",
		"text": "https://archive.orkl.eu/c403518d43b936b6e052cd192a4aba8596e92375.txt",
		"img": "https://archive.orkl.eu/c403518d43b936b6e052cd192a4aba8596e92375.jpg"
	}
}