Jihadist Makes Cyber Attack

By Kevin Coleman — Defense Tech Cyber Warfare contributor

Last week’s rapidly spreading computer virus has been traced back to a cyber-jihad group called Tariq ibn Ziyad. Information security company SecureWorks was able to link this cyber jihad group to the ‘Here you have’ malicious worm. The worm was able to crash systems, computer networks and bring down email servers. IDG reported the worm was able to disrupt large U.S. organizations including Disney, Proctor and Gamble, AIG, Wells Fargo, Comcast and NASA.

Analysis indicated a back-door established by the worm that could be used by the cyber terrorists to remotely log into any infected system. The worm also has functionality that attempts to disable anti-virus and security software that is installed and operational on the infected computer. In addition, the worm tries to establish a connection to a computer that uses the Tariq ibn Ziyad name. Further analysis focusing on the worm’s Digital DNA  indicates it is identical to a piece of malicious code released last month. This analysis indicates that both pieces of code refers to a Libyan hacker who is said to use the name Iraq Resistance. This name has also been associated with efforts that are trying to form a hacking group called Brigades of Tariq ibn Ziyad, according to cyber intelligence provided by SecureWorks.

Further intelligence indicates Tariq ibn Ziyad’s objective is to “penetrate U.S. agencies belonging to the U.S. Army.”  All of this taking place as the United Nation’s Telecommunications chief issues a warning and calls for nations to join together in developing a coherent global cyber security peace treaty or face the very real possibility of an all-out cyber war.

  • Joe Blough

    Tech, what public forum was this?

    Maybe the moderators know more.

  • Bill

    Dear Jihadists,
    TRON isn’t real, leave Disney alone.

    Sincerely,
    The United States

  • Bob

    Why am I not suprised. Thankfully, we are not at war with Islam, and it is a religion of peace. Just think what Islam might do if it were at war with us, and not such a peaceful group.

  • STemplar

    Break out the Xboxes and return fire…..

  • prometheusgonewild

    And who trained them? We did.
    Lets thank our leaders and their enlightened graduate student policies…..
    Just like those nice boys who wanted to learn how to fly…….

    • Sev

      There are so many muslims at my school (Tech and engnineering school). They give ROTC kids a sneer look. I’ll bet some of them are going to pakistan afterward to build IEDs. Of course my school and its students are sooooo Politically COrrect that we have interfaith Appreciation.

    • NunyaBiznez

      I knew we should have shot that arab muslim in our IT Computer security class in college before he went back to his home in the middle east.

  • Tech

    Here’s the link to a video uploaded by the individual who claimed responsibility for the worm. http://www.youtube.com/profile?user=iqziad

    Some other bits of info I’ve gathered:
    – the individual ASKED for assistance in using VB to write the code used in the worm on a public forum
    – another more sophisticated attack was executed in unison with the worm – this one used a vulnerability in Win7 and WinXP

    All-in-all, the guy obviously had some help b/c he doesn’t seem too smart at all. The 2nd attack was the sophisticared one that should be analysed more closely as the vulnerabilities used are sophisticated in and of themselves.

  • STemplar

    Does he have an IP address? I think I’ve got a tasking for Delta…….

  • blight

    We do have a precedent for international policing: Interpol. Perhaps a Cyberpol is the answer?

  • STemplar

    Perhaps a 12 man team with ninja hoods and a bag is the answer, post that on youtube and see how many techno dorks are in a rush to hack stuff…

  • Donnell

    How about our political leaders make a law stating that any cyber attack against the US will be viewed as a foreign military attack on the US and the US will respond in kind with force and as STemplar stated earlier, a tasking for Delta and lets see what happens then.

    • blight

      Makes false flag attacks more entertaining. Tonkin Gulf incident, except the “torpedo spread” is a ddos attack rerouted through Switzerland. Let the smart bombs fly!

    • thedavidwilson

      Then we might have to go to war against islam which we are not at war with.

  • Donnell

    Instead of keeping our Delta operations against these cyber attackers secret, The military should leak what happened to the press with some very graphic photos. Sort of like what the British SAS does. Just to let the bad guys know this is your brain with lead poising

  • Jon

    I still can’t believe the gov’t uses Windows for critical systems. If they’re not willing to develop their own embedded OS then at least use a version of Unix. Thank goodness I use a Mac and don’t have to worry about this crap.

  • Tony C

    The right thing to do is revise the law that prevents retaliation by the computers that are under attack, even when they know that there is a denial of service attack. So far,
    the hackers have the law on their side. I would love to see my antivirus return a retrovirus to an attacking machine.

    • blight

      Are you willing to trust that much autonomy to a software program? Some antiviruses have high false positive or false negative rates, which would bog down the internet in retaliatory attacks.

  • Musson

    I believe it is time to take the War to these Jihad geeks.

    Also, if the person is an American citizen, give the 30 days to surrender and
    return to the US for due process. After that – all bets are off.

  • Oblat

    The end is neigh send money to Kevin quickly !

  • roland

    These are Saudi radical islamist color and hand writings on the wall on the picture. Probably terrorist.

  • I know this if off topic but I’m looking into starting my own weblog and was
    curious what all is needed to get set up?
    I’m assuming having a blog like yours would cost a pretty penny?
    I’m not very internet savvy so I’m not 100% positive. Any suggestions or advice would be
    greatly appreciated. Many thanks