Threat Actor Characterization
Syrian Electronic Army
ID: 91bb6428c67a3dec38e3ffd2472a9bac52165| SEA | SyrianElectronicArmy | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
Syrian Electronic Army (SEA) — pro-Assad hacktivist/IO group active since 2011; responsible for the 2013 AP Twitter hijack that briefly moved U.S. markets, and the 2013 NYTimes DNS/registrar hijack. U.S. indictments in 2016 named operators and described tactics.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1566 | Phishing | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1190 | Exploit Public-Facing Application | TA0001 |
|
CLASSIFICATION: Unclassified / Open Source
Executive Summary
The Syrian Electronic Army (SEA)—a pro-Assad hacktivist/IO actor—has executed high-visibility operations since 2011, including the 2013 AP Twitter compromise that caused a brief U.S. stock dip and 2013 NYTimes DNS/registrar hijack and redirection. U.S. legal actions in 2016 named SEA members and detailed tactics. Confidence: high (indictments; mainstream media corroboration).
Pro-regime information warfare ethos; small, capable core with auxiliaries; mixes social-engineering, account takeovers, and DNS/registrar tampering to maximize media impact. The Associated Press
Aims to shape narratives, embarrass Western media, and bolster regime legitimacy via spectaculars that drive coverage and sow confusion. WIRED