Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Poor Coding Limits Cyber-Capabilities of IS Hackers

 

As per a new research, the terrorist group built tools for online attack is full of general errors. Kyle Wilhoit, Sr. Security Researcher, speaking in security conference DerbyCon, stated that the attack tool produced by 1 larger IS hacker collective "garbage".

 

Mr. Wilhoit analysed 3 different kinds of tools that have been created by the hackers who are part of UCC (United Cyber Caliphate). This was made an umbrella organization for as many as 17 hacker groups, who had announced to support the IS. Kyle Wilhoit, Sr. Security Researcher, said in security conference DerbyCon that they created buggy malware along with encryption programs that are easily crackable. He particularly called 3 attack tools that were created by 1 big IS hacker collective "garbage".

 

Bbc.com posted on September 25th, 2017, that Mr. Wilhoit, cyber-security researcher of Domain Tools, at the time of his work presentation in the conference at Kentucky said that while IS has been hugely proficient to use social media as recruitment as well as propaganda tool, its cyber-attack arm has not been as effective.

 

ISIS is actually bad in development of the encryption software as well as malware, emphasizing that few very general errors has made practically the total malware "completely useless".

 

He also said that IS had to learn a lot, when it is related to hiding their activities online. There are several instances of it sharing images of highly successful attacks, or praising its members, which still held metadada that can identify the place of photography. Mr. Wilhoit, at the time of his research, says that he has found an insecure IS server online which served as repository of the images that the group has planned to use for the propaganda.

 

Mr. Wilhoit said that several people who are involved with IS cyber-arm were killed in the drone strikes, and added that it has been open to assumption regarding how location data for aiding drones was discovered. He also said that UCC had started to attack the tools used by the Western cyber-thieves during last year.

 

Organisations or indeed governments, resorting to hacking is not exactly new. However, it is slightly encouraging to hear that at least IS is dreadful at it. It is expected that their hackers will remain unaware of this and continue in their garbage coding exploits.

» SPAMfighter News - 10/4/2017

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next