Year: 2025 | Month: June | Volume 13 | Issue 1
Emerging Digital Extremism: Analyzing Patterns, Evolving Threats, and Global Security Implications of Cyber Attacks by Extremist Groups
Nahid Reza Shatu
Prosannajid Sarkar
Md Asaduzzaman
Anima Barma
DOI:10.30954/2322-0465.1.2025.8
Abstract:
The digital age has significantly transformed the operations of extremist groups, enabling them to utilize cyberspace for radicalization, propaganda, recruitment, and cyber warfare. This report analyses the increasing threat of digital extremism, investigating the evolving patterns of cyberattacks, exploited vulnerabilities, and their global consequences. The study utilizes a mixed-methods approach, combining qualitative techniques (thematic and discourse analysis) with quantitative methods (descriptive statistics). Data was obtained from primary sources, including interviews and dark web activity, as well as secondary sources, such as cybersecurity databases and international security periodicals. Ethical considerations, including data protection and bias prevention, were recognized, yet challenges such as data accessibility and the dynamic nature of cyber threats persist. Extremist organizations are increasingly utilizing advanced cyber tactics, including DDoS attacks, ransomware, phishing, website defacement, data breaches, and AI-driven disinformation campaigns. These strategies compromise critical infrastructure, skew public image, and fund illicit activities, posing significant risks to national security, economic stability, and social unity. Significant vulnerabilities, including insufficient cybersecurity protocols, encrypted communication platforms, the dark web, and the misuse of emerging technology such as artificial intelligence and deepfakes, exacerbate the threat. These tools enable radicals to operate with increased anonymity, scale, and influence, resulting in global consequences that extend beyond security to disrupt geopolitical dynamics and erode trust in digital systems. The paper emphasizes the imperative of proactive cybersecurity strategies, AI-enabled threat detection, global intelligence sharing, and cooperation among various stakeholders to mitigate this threat.
©
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited
Print This Article
Email This Article to Your Friend