Al Qaeda Hacker Attack Scheduled To Begin November 11th - InformationWeek
IoT
IoT
Software // Enterprise Applications
News
10/31/2007
06:03 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%
RELATED EVENTS
Moving UEBA Beyond the Ground Floor
Sep 20, 2017
This webinar will provide the details you need about UEBA so you can make the decisions on how bes ...Read More>>

Al Qaeda Hacker Attack Scheduled To Begin November 11th

An Israeli news site claims Bin Laden's cyber legions are retaliating against Western surveillance programs.

Bin Laden's "cyber legions," if they can be called that, may be armed with software called Electronic Jihad 2.0, which has been available online since the beginning of the year. Though one of the sites distributing the software has been taking down, it's still accessible.

Secure Computing Corporation, a computer security company, "believes that the new Electronic Jihad Version 2.0 software has the potential to create havoc among sites that might be targeted," as the company put it in a press release.

Paul Henry, VP of technology evangelism at Secure Computing, said that the first version of Electronic Jihad allowed the user to conduct a denial of service attack. The most recent iteration allows for a coordinated, or distributed, denial of service attack.

"As to how imminent the threat is, I have to rely on the posting on DEBKAfile," said Henry. "People I've talked to say it's a reliable source."

Despite the fact that Electronic Jihad relies on "an old attack methodology," Henry said that he believed people have grown too lax about the potential impact of distributed denial of service (DDOS) attacks because such attacks haven't been common in the wild in recent years.

Marc Zwillinger, a former cybercrime prosecutor with the Department of Justice and a partner at Sonnenschein Nath & Rosenthal, said it's hard to tell how to view such reports. "There have been on and off warnings of e-jihads for years, some of which have materialized and some of which haven't," he said.

While the involvement of Al Qaeda may sound ominous, Zwillinger noted that terrorists menacing people with zombies -- subverted PCs -- are no more dangerous than the security risks faced by Internet users every day. And, he added, networks today, tend to perform better against denial of service attacks than they did several years ago.

In a February, 2007 article, "Cyberspace as a Combat Zone: The Phenomenon of Electronic Jihad," Eli Alshech, Director of the Jihad and Terrorism Studies Project at the Middle East Media Research Institute, characterized e-jihadists as more of a nuisance than a threat.

"[E]lectronic jihad, in its current state of development, is capable of causing some moderate damage to Western economy, but there is no indication that it constitutes an immediate threat to more sensitive interests such as defense systems and other crucial infrastructure," the article says. "Nevertheless, in light of the rapid evolvement (sic) of this phenomenon, especially during the recent months, the Western countries should monitor it closely in order to track the changes in its modes of operation and the steady increase in its sophistication."

Previous
2 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
[Interop ITX 2017] State Of DevOps Report
[Interop ITX 2017] State Of DevOps Report
The DevOps movement brings application development and infrastructure operations together to increase efficiency and deploy applications more quickly. But embracing DevOps means making significant cultural, organizational, and technological changes. This research report will examine how and why IT organizations are adopting DevOps methodologies, the effects on their staff and processes, and the tools they are utilizing for the best results.
Register for InformationWeek Newsletters
White Papers
Current Issue
IT Strategies to Conquer the Cloud
Chances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.
Video
Slideshows
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll