Jihadist Makes Cyber Attack

By Kevin Coleman — Defense Tech Cyber Warfare contributor

Last week’s rapidly spreading computer virus has been traced back to a cyber-jihad group called Tariq ibn Ziyad. Information security company SecureWorks was able to link this cyber jihad group to the ‘Here you have’ malicious worm. The worm was able to crash systems, computer networks and bring down email servers. IDG reported the worm was able to disrupt large U.S. organizations including Disney, Proctor and Gamble, AIG, Wells Fargo, Comcast and NASA.

Analysis indicated a back-door established by the worm that could be used by the cyber terrorists to remotely log into any infected system. The worm also has functionality that attempts to disable anti-virus and security software that is installed and operational on the infected computer. In addition, the worm tries to establish a connection to a computer that uses the Tariq ibn Ziyad name. Further analysis focusing on the worm’s Digital DNA  indicates it is identical to a piece of malicious code released last month. This analysis indicates that both pieces of code refers to a Libyan hacker who is said to use the name Iraq Resistance. This name has also been associated with efforts that are trying to form a hacking group called Brigades of Tariq ibn Ziyad, according to cyber intelligence provided by SecureWorks.

Further intelligence indicates Tariq ibn Ziyad’s objective is to “penetrate U.S. agencies belonging to the U.S. Army.”  All of this taking place as the United Nation’s Telecommunications chief issues a warning and calls for nations to join together in developing a coherent global cyber security peace treaty or face the very real possibility of an all-out cyber war.

19 Comments on "Jihadist Makes Cyber Attack"

  1. Tech, what public forum was this?

    Maybe the moderators know more.

  2. Dear Jihadists,
    TRON isn't real, leave Disney alone.

    Sincerely,
    The United States

  3. Why am I not suprised. Thankfully, we are not at war with Islam, and it is a religion of peace. Just think what Islam might do if it were at war with us, and not such a peaceful group.

  4. Break out the Xboxes and return fire…..

  5. prometheusgonewild | September 13, 2010 at 4:39 pm | Reply

    And who trained them? We did.
    Lets thank our leaders and their enlightened graduate student policies…..
    Just like those nice boys who wanted to learn how to fly…….

  6. Here's the link to a video uploaded by the individual who claimed responsibility for the worm. http://www.youtube.com/profile?user=iqziad

    Some other bits of info I've gathered:
    – the individual ASKED for assistance in using VB to write the code used in the worm on a public forum
    – another more sophisticated attack was executed in unison with the worm – this one used a vulnerability in Win7 and WinXP

    All-in-all, the guy obviously had some help b/c he doesn't seem too smart at all. The 2nd attack was the sophisticared one that should be analysed more closely as the vulnerabilities used are sophisticated in and of themselves.

  7. Does he have an IP address? I think I've got a tasking for Delta…….

  8. We do have a precedent for international policing: Interpol. Perhaps a Cyberpol is the answer?

  9. Perhaps a 12 man team with ninja hoods and a bag is the answer, post that on youtube and see how many techno dorks are in a rush to hack stuff…

  10. How about our political leaders make a law stating that any cyber attack against the US will be viewed as a foreign military attack on the US and the US will respond in kind with force and as STemplar stated earlier, a tasking for Delta and lets see what happens then.

  11. Instead of keeping our Delta operations against these cyber attackers secret, The military should leak what happened to the press with some very graphic photos. Sort of like what the British SAS does. Just to let the bad guys know this is your brain with lead poising

  12. I still can't believe the gov't uses Windows for critical systems. If they're not willing to develop their own embedded OS then at least use a version of Unix. Thank goodness I use a Mac and don't have to worry about this crap.

  13. The right thing to do is revise the law that prevents retaliation by the computers that are under attack, even when they know that there is a denial of service attack. So far,
    the hackers have the law on their side. I would love to see my antivirus return a retrovirus to an attacking machine.

  14. I believe it is time to take the War to these Jihad geeks.

    Also, if the person is an American citizen, give the 30 days to surrender and
    return to the US for due process. After that – all bets are off.

  15. The end is neigh send money to Kevin quickly !

  16. These are Saudi radical islamist color and hand writings on the wall on the picture. Probably terrorist.

  17. I know this if off topic but I’m looking into starting my own weblog and was
    curious what all is needed to get set up?
    I’m assuming having a blog like yours would cost a pretty penny?
    I’m not very internet savvy so I’m not 100% positive. Any suggestions or advice would be
    greatly appreciated. Many thanks

Leave a comment

Your email address will not be published.


*