Skip links

ICT Cyber-Desk Review: Report #16

Download Full Report

This report covers the period of January – March 2016 and covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack).

The following are among the issues covered in this report:

The continuing trend of publishing information security guidelines and recommendations, including information and recommendations for correct methods of operation and software manuals, or services with a high encryption or anonymity level.

Terrorist organizations continue to publish information about the dangers of intelligence and law enforcement officials who operate on the Internet to search for and locate terrorism supporters. In addition, all supporters are called on to continue spreading the organizations’ messages and guidelines for proper work.

Officials in jihadist organizations continue to spread Best Practice guidebooks on the Internet and guidelines for using software and applications to increase information security. These are mainly used to encrypt data on the device and/or for data trafficking and maintaining the anonymity of Internet users. In addition, manuals for video processing are found. As previously stated, in recent years organizations have been using a wide range of software in order to create visual content at a professional level.

Terrorists and terrorism supporters continue to hack Internet sites, especially as part of defacement attacks. In January 2016, Islamic State activists tried to recruit hackers to hack into government databases for pay. In February 2016, a television interview in Lebanon reported the existence of a Shi’ite hacker group, affiliated with Hezbollah, named Kadimon (translation – we are coming). The article raised the claim that members of the group had successfully hacked into security cameras throughout Israel, including cameras at the Ministry of Defense at the government offices campus in Tel Aviv.

Following the terrorist attacks in Europe, it seems that the European Union is re-evaluating the growing threat posed by the Islamic State. In addition, the launch of a US cyber campaign against the organization is reported in February, aimed at disrupting and even restricting the Islamic State’s ability to operate on the Internet. It should be noted that cooperation between countries and companies, such as Twitter, has been successful in removing IS content from the Internet.

Ransomware continues to pose a major threat from cybercrime organizations, and the trend of malware expansion continues to affect additional systems and devices, including Android mobile devices. In addition, there was an increase in the sale of ransomware-as-service, in which advanced malware can be purchased or downloaded to launch an independent attack.

Click Here to view Article File