IS the pirates have the “poor coding skills’


Hackers working for the so-called Islamic State are wrong encoding, and to hide what they do, suggests research.

They produce buggy software, malicious and easily crackable encryption programs, said senior security researcher Kyle Wilhoit to the security conference DerbyCon.

In particular, it has called three attack tools created by a large collective of hackers “garbage”.

Their low level of skills, which are the groups that have changed to online services and the dark web to the attack code, he said.Little trouble

Everything IS very proficient in the use of social media as a recruitment and propaganda tool, of cyber-attack arm was nearly as effective, said Mr. Wilhoit, a cyber-security researcher at Domain Tools, while presenting his work at the conference, in Kentucky.

“ISIS is really, really bad in the development of encryption software and malware,” he said of the new technology output from The Register, adding that the vulnerabilities found in all the tools effectively rendered them “completely useless”.

In the context of his research, Mr. Wilhoit analyzed three distinct types of the tools created by hackers who have been part of what is known as the Kingdom-Cyber Caliphate (UCC). This has been established as an umbrella organization for the 17 groups of pirates who had declared their support for IS.

All the tools have problems, ” he said.
the group of malicious software was full of bugs base
a secure email system, it has developed a leak of information about users
the cost of use of the web attack tool has failed to take down any important target

In addition, attempts to raise funds through donations of bitcoins have been diluted by the scammers to cash on the name and production of web sites mimicking the calls of funds.


“As ISIS are not a lot on the operational plan, capable online,” Mr. Wilhoit added. “There is a lack of expertise in just about everything,”

IS also has a lot to learn when it came to hide his online activities, he said. There are many examples of sharing photos of success of the attack, or who has leased its members, who are still held at the metadata which could identify where the photos were taken.

Mr. Wilhoit said that, in the course of his research, he has found a non-protected online server that served as a repository of images, the group has planned to use for propaganda purposes.

“You can, in principle, the mass of export of the metadata from each photo, and literally get up-to-the-second information on where people are operating, because they are not really that great during the security operation,” he said.

Most of the people involved with the cyber-arm of the EAST had been killed in the drone strikes, said Mr. Wilhoit said that it was open to speculation on how the location data with the help of drones has been found.

In the course of the last year, the UCC began to attack the tools used by the West to the cyber-thieves, ” he said.

“They know that they can’t develop tools worth anything, so they are going to use stuff that works, is inexpensive, and is easy to use.”