Friday, April 4, 2025
Homecyber securityEuropol Taken Down 13 Websites Linked to Terrorist Operations

Europol Taken Down 13 Websites Linked to Terrorist Operations

Published on

SIEM as a Service

Follow Us on Google News

Europol and law enforcement agencies from ten countries have taken down 13 websites linked to terrorist operations.

The joint operation, known as Operation HOPPER II, targeted online platforms used by religious and politically motivated terrorist organizations to spread propaganda and recruit members.

Targeting Key Assets in Online Terrorist Propaganda

Operation HOPPER II focused on disrupting the online dissemination of terrorist propaganda by targeting websites operated by groups such as the so-called Islamic State, al-Qaeda, and Hay’at Tahrir al-Sham.

The operation resulted in the seizure of four servers in Romania, Ukraine, and Iceland and the removal of associated websites.

Scan Your Business Email Inbox to Find Advanced Email Threats - Try AI-Powered Free Threat Scan

The European Union Internet Referral Unit (EU IRU) within Europol’s European Counter Terrorism Centre coordinated the operation, working closely with law enforcement authorities from Albania, Bosnia and Herzegovina, Denmark, Germany, Iceland, Moldova, Romania, the Slovak Republic, Ukraine, and the United Kingdom.

PERCI: A Single System for Referrals and Removal Orders

Europol has developed a technical solution called the EU Platform on Illicit Content Online (PERCI) to facilitate the implementation of the Terrorist Content Online Regulation (TCO Regulation – (EU) 2021/784).

PERCI is a single system connecting EU Member States with hosting service providers, enabling the efficient transmission of removal orders for terrorist content.

The successful execution of Operation HOPPER II demonstrates the effectiveness of international cooperation in combating terrorist propaganda online.

By targeting key assets and leveraging advanced technical solutions, Europol and its partners continue to disrupt the ability of terrorist organizations to recruit, radicalize, and mobilize supporters through the Internet.

Free Webinar! 3 Security Trends to Maximize MSP Growth -> Register For Free

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Secure Ideas Achieves CREST Accreditation and CMMC Level 1 Compliance

Secure Ideas, a premier provider of penetration testing and security consulting services, proudly announces...

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New Phishing Campaign Targets Investors to Steal Login Credentials

Symantec has recently identified a sophisticated phishing campaign targeting users of Monex Securities (マネックス証券),...

UAC-0219 Hackers Leverage WRECKSTEEL PowerShell Stealer to Extract Data from Computers

In a concerning development, CERT-UA, Ukraine's Computer Emergency Response Team, has reported a series...

Hunters International Linked to Hive Ransomware in Attacks on Windows, Linux, and ESXi Systems

Hunters International, a ransomware group suspected to be a rebrand of the infamous Hive...