It's no surprise that terrorists continue to use the Internet to communicate and recruit members, and exposing their methods may help to curb the violence and destruction caused by their actions. Below are the latest Internet techniques used by terrorists worldwide:
- Metasploit LLC links to malware for phishing, denial-of-service-attacks, and other online chicanery.
- YouTube Inc. videos showing how to build a bomb-laden vest, complete with a detonator -- and now in high-def, since YouTube raised the limit on the size of files that can be uploaded.
- Use of a single Web mail account (a.k.a. "blind drop"), where multiple users share a single password, leaving messages in the "Drafts" folder, so key information never gets transmitted or caught up in Web filters.
- vBulletin, which sets up social sites quickly, as well as more conventional social media like Yahoo and Google Groups, Twitter, and Facebook. Imam Anwar al Awlaki has a Facebook page that makes him look "like a rockstar."
- VMware and use of virtual machines to better conceal malicious payloads and attacks.
- In addition to Windows, terrorists are also making greater use of mobile technologies and mobile hacking tools, as well as forensic toolkits.
- Scanned documents in downloadable .pdf formats, like the Mujahideen Handbook, or bomb-making kits describing payloads for different vehicle sizes, kill radius, and other destructive criteria.
Jeff Bardin, VP and chief security officer at consultancy ITSolutions said at an RSA conference last week, "The point is to slaughter, and they use the Internet to do that. They're using our own infrastructure against us," "And not just in Arabic, but in English, German, and Spanish, too."
Source: Internet Revolution. 11 Mar 2010.