Syrian Electronic Army put at top of FBI's Most Wanted list
$100,000 reward for SEA hackers known as 'Th3 Pr0' and 'The Shadow'

Two members of the Syrian Electronic Army have been placed at the top of the FBI's list of most wanted cyber criminals.
The agency is offering a reward of up to $100,000 (70,583) each for information leading to the arrest of Ahmad Al Agha, who goes by the online handle of 'Th3 Pr0', and Firas Dardar, otherwise know as 'The Shadow'.
Dardar and Al Agha are both wanted in connection with "dozens of cyber attacks against United States government agencies, media organisations, and private organisations". Dardar is also suspected of orchestrating a number of online extortion schemes.
The pair are believed to operate on behalf of the Syrian Electronic Army, a cyber terrorism group with nebulous ties to the regime of Syrian dictator Bashar Al-Assad.
Although the group has undertaken numerous operations in support of the Syrian government, the relationship between the two has never been explicitly confirmed, and opinion remains divided as to whether it is officially sanctioned.
"While some of the activity sought to harm the economic and national security of the United States in the name of Syria," assistant attorney general for National Security John P Carlin said. "These detailed allegations reveal that the members also used extortion to try to line their own pockets at the expense of law-abiding people all over the world."
"The allegations in the complaint demonstrate that the line between ordinary criminal hackers and potential national security threats is increasingly blurry."
Get the ITPro. daily newsletter
Sign up today and you will receive a free copy of our Focus Report 2025 - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
Al Agha and Dardar have joined the list ahead of other cyber-criminals, including Eastern European racketeers and three members of the Chinese army.
People's Liberation Army officers Sun Kailiang, Huang Zhenyu and Wen Xinyu are charged with breaking into US companies' networks for the benefit of state-owned Chinese rivals.
Adam Shepherd has been a technology journalist since 2015, covering everything from cloud storage and security, to smartphones and servers. Over the course of his career, he’s seen the spread of 5G, the growing ubiquity of wireless devices, and the start of the connected revolution. He’s also been to more trade shows and technology conferences than he cares to count.
Adam is an avid follower of the latest hardware innovations, and he is never happier than when tinkering with complex network configurations, or exploring a new Linux distro. He was also previously a co-host on the ITPro Podcast, where he was often found ranting about his love of strange gadgets, his disdain for Windows Mobile, and everything in between.
You can find Adam tweeting about enterprise technology (or more often bad jokes) @AdamShepherUK.

‘This shift highlights not just a continuation but a broad acceptance of remote work as the norm’: Software engineers are sticking with remote work and refusing to budge on RTO mandates – and 21% would quit if forced back to the office

Healthcare systems are rife with exploits — and ransomware gangs have noticed

ESET looks to ‘empower’ partners with cybersecurity portfolio updates