Skip links

ICT Cyber-Desk Review: Report #6

Download Full Report

This report covers two main subjets: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse); and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report:

  • The new encryption software: Asrar Al-Ghuraba, “Secrets of foreigners”, was published and distributed on the Snam Al-Islam Web forum. The Global Islamic Media Front jihadist media institution published a warning in Arabic and English not to use the software since it did not come from an official source.
  • Various Web forums quoted and referenced the report by “60 Minutes” about the concern expressed by the personal physician of Dick Cheney, former Vice President of the United States, over an intentional attack [against Cheney] by terrorist organizations. His concern was due the fact that the Cheney’s pacemaker could be controlled remotely.
  • Officials from the “Anonymous” hackers groups continued their politically-motivated attacks around the world against targets in Arab countries, such as Syria and Morocco, and the United States in response to publications regarding activities by the National Security Agency (NSA). The Syrian Electronic Army continued its retaliatory attacks against elements that expressed opposition to the Assad regime.
  • The Bitcoin gained momentum and crossed the $1,000 exchange rate mark. The Bitcoin’s popularity has resulted in its acceptance as payment by an increasing number of establishments. In addition, an ATM machine was launched that enables the purchase and sale of the digital currency.
  • A Web site designed to raise money for the Islamic struggle on the dark Web (Using TOR) was not successful with its goal as the site’s credibility was in question.
  • This report includes an in-depth analysis of “Ransomware”, a type of malware that has returned to the scene with the advent of the Cryptolocker. Malware that struck hundreds of thousands of computers around the world and amassed tens of millions of dollars from victims. Such malwares were developed over time and make use of virtual and anonymous payment methods in order to extort money [from victims].

Click Here to view Article File