U.S. charges three suspected Syrian Electronic Army hackers

U.S. charges three suspected Syrian Electronic Army hackers


The U.S. government has brought criminal charges against three alleged members of the Syrian Electronic Army — a hacking group that supports embattled Syrian President Bashar al-Assad — for a years-long campaign of digital attacks. One of them is now in German custody.

The charges against 22-year-old Ahmad Umar Agha, also known as “The Pro” online; 27-year-old Firas Dardar, whose online name is “The Shadow”; and 36-year-old Peter Romar, known by the alias Pierre Romar, were unsealed Tuesday.

Agha and Dardar were charged with a criminal conspiracy in relation to a string of attacks targeting media companies, as well as various government agencies.

The pair allegedly deployed phishing techniques to trick people into handing over log-in information to their email or other official accounts, according to the complaint. Typically, the hackers would send an email to a target that was designed to look as if it came from a trusted source. When a victim clicked through a link in the email, they would be directed to a site requesting their credentials that appeared legitimate, but was in fact controlled by the Syrian Electronic Army.

If a target fell for the fake login page, the group would use the stolen credentials to help gain access to websites and social media accounts they would then deface with messages in support of the Assad regime.

Although the techniques were not highly sophisticated, they caused disruptions for some media organizations and showed how even moderately skilled hackers can take advantage of victims.

“This is yet another law enforcement win that [shows] no one is above the law, but these are not major criminals that were posing a threat to the United States,” said Dmitri Alperovitch, cofounder of CrowdStrike, a cybersecurity firm.

Starting in 2011, the conspiracy allegedly attempted to use those tactics to break into accounts and systems related to the executive office of the president but it was unsuccessful. And later attacks targeting NASA employees were stymied by the agency’s security systems, according to the complaint.

But the Syrian Electronic Army had more luck with news outlets. In one memorable 2013 hack, the Syrian Electronic Army took over the Associated Press’s Twitter account, sending out a message that falsely claimed that there was an explosion at the White House and that President Obama was injured. The hoax briefly caused a $136 billion dip in the stock market.

Later that year, the group also compromised Outbrain, a content recommendation service then used by outlets including The Washington Post, CNN and Time — causing some pages to redirect to sites promoting the Syrian Electronic Army.

Agha and Dardar, both of whom are thought to be in Syria, have been placed on the FBI’s “Cyber Most Wanted” list. The agency is offering $100,000 rewards for information leading to their arrests, according to a Justice Department press release.

Romar and Dardar were separately charged with conspiracies connected to a hacking-related extortion scheme: They would infiltrate victims’ computers and networks and then effectively ransom them — at times, invoking their connection to the Syrian Electronic Army to intimidate victims, according to the government’s complaint. If sanctions or other international agreements blocked a victim from sending money to Dardar in Syria, Romar — who resided in Germany — would help funnel the funds to him, according to the complaint.

Romar was arrested in Germany and the Justice Department is seeking his extradition, said U.S. officials, who spoke on the condition of anonymity to discuss a pending investigation.

“The Justice Department will seek to bring Romar to justice here in the United States,” said a department spokesman.


This article was written by Andrea Peterson;Ellen Nakashima from The Washington Post and was legally licensed through the NewsCred publisher network.



Learn From The Leader

American Military University (AMU) is proud to be the #1 provider of higher education to the U.S. military, based on FY 2018 DoD tuition assistance data, as reported by Military Times, 2019. At AMU, you’ll find instructors who are former leaders in the military, national security, and the public sector who bring their field-tested skills and strategies into the online classroom. And we work to keep our curriculum and content relevant to help you stay ahead of industry trends. Join the 64,000 U.S. military men and women earning degrees at American Military University.

Request Information

Please complete this form and we’ll contact you with more information about AMU. All fields except phone are required.

Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Validation message here
Ready to apply? Start your application today.

We value your privacy.

By submitting this form, you agree to receive emails, texts, and phone calls and messages from American Public University System, Inc. which includes American Military University (AMU) and American Public University (APU), its affiliates, and representatives. I understand that this consent is not a condition of enrollment or purchase.

You may withdraw your consent at any time. Please refer to our privacy policy, terms, or contact us for more details.