Program automating online jihad found in the wild

By
<http://forms.theregister.co.uk/mail_author/?story_url=/2007/11/08/electroni
c_program_of_jihad_discovered/> Dan
<http://forms.theregister.co.uk/mail_author/?story_url=/2007/11/08/electroni
c_program_of_jihad_discovered/>
<http://forms.theregister.co.uk/mail_author/?story_url=/2007/11/08/electroni
c_program_of_jihad_discovered/> Goodin in San Francisco 

8 Nov 2007 00:46

Electronic jihad 3.0

Security researchers say they have discovered a program that could be used
by Islamic terrorists to launch data attacks against Western targets.

The "Electronic Program of Jihad," as its creators have dubbed it, asks for
a username and password once it's installed, according to
<http://www.avertlabs.com/research/blog/index.php/2007/11/07/cyber-jihad-ill
-say-good-and-quiet-november-11-to-you/> this entry on the McAfee Avert Labs
Blog. The program, quoted as version 3.0, then tries to join a cyber
jihadist website that coordinates the attack. Loyal users can even score
bonus points by referring newcomers.



The revelation comes two weeks after Israeli news website Debkafile
<http://www.debka.com/headline.php?hid=4723> reported calls by an Islamist
website for true believers to mount electronic attacks on "Western, Jewish,
Israeli, Muslim apostate and Shiite websites". Rather than launching the
assault through a network of compromised PCs, the organizers reportedly plan
to supply a package called Electronic Jihad Version 2.0 that volunteers
could use to unleash denial-of-service attacks against the targets.

Many security experts have said the report should be treated with a liberal
dose of skepticism. They argue that Debkafile is a less-than-reliable source
and say grass-roots-based cyber attacks by militant Islamists already happen
all the time.



Logo unearthed by Debkafile

The icon for the Electronic Program of Jihad bears the symbol of al Qaeda's
Cyber Warriors, matching one presented by Debkafile in a recent press
release. Even still, McAfee researcher Francois Paget stopped short of
saying the program is directly connected to the reported cyberjihad.

"I wrote this blog entry to demonstrate that at least one terrorist ring is
interested in malware," he wrote. "But it seems to me, they have not reached
the technical level of some criminal groups, for now."

For one thing, the system has no fast-flux network or other decentralized
command-and-control features, so it would be relatively easy for someone to
take it down. And for another the cyber jihadist website supposedly
coordinating the attack is currently unreachable.

Similarly, Gadi Evron, a Security Architect at Afilias Global Registry
Services, also discounted the likelihood that the software represented much
of new threat.

"My educated guess would be that this is 'just yet another tool' that some
enthusiasts on a web forum developed, Evron wrote in an email to El Reg.
"There are many enthusiast 'cyber terrorists' of a low technical and
operational level who deface web sites and launch DDoS attacks of varying
success for clear political goals, ranging from US politics to the Middle
East to the far east." R

 

 
<http://www.channelregister.co.uk/2007/11/08/electronic_program_of_jihad_dis
covered/> 



[Non-text portions of this message have been removed]



--------------------------
Want to discuss this topic?  Head on over to our discussion list, [EMAIL 
PROTECTED]
--------------------------
Brooks Isoldi, editor
[EMAIL PROTECTED]

http://www.intellnet.org

  Post message: [email protected]
  Subscribe:    [EMAIL PROTECTED]
  Unsubscribe:  [EMAIL PROTECTED]


*** FAIR USE NOTICE. This message contains copyrighted material whose use has 
not been specifically authorized by the copyright owner. OSINT, as a part of 
The Intelligence Network, is making it available without profit to OSINT 
YahooGroups members who have expressed a prior interest in receiving the 
included information in their efforts to advance the understanding of 
intelligence and law enforcement organizations, their activities, methods, 
techniques, human rights, civil liberties, social justice and other 
intelligence related issues, for non-profit research and educational purposes 
only. We believe that this constitutes a 'fair use' of the copyrighted material 
as provided for in section 107 of the U.S. Copyright Law. If you wish to use 
this copyrighted material for purposes of your own that go beyond 'fair use,' 
you must obtain permission from the copyright owner.
For more information go to:
http://www.law.cornell.edu/uscode/17/107.shtml 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/osint/

<*> Your email settings:
    Individual Email | Traditional

<*> To change settings online go to:
    http://groups.yahoo.com/group/osint/join
    (Yahoo! ID required)

<*> To change settings via email:
    mailto:[EMAIL PROTECTED] 
    mailto:[EMAIL PROTECTED]

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to