Upgrade to Pro — share decks privately, control downloads, hide ads and more …

RSA_Europe_Presentation_01.pdf

 RSA_Europe_Presentation_01.pdf

Cyber Jihad vs Cyberterrorism - Separating Hype from Reality.

Dancho Danchev

March 19, 2017
Tweet

More Decks by Dancho Danchev

Other Decks in Research

Transcript

  1. Cyber Jihad vs Cyberterrorism – Separating Hype
    from Reality
    Dancho Danchev
    Cybercrime Researcher, Security Blogger at ZDNet,
    Security Blogger at Webroot Inc.

    View full-size slide

  2. Who is Dancho Danchev?

    Internationally recognized cybercrime researcher
    – http://ddanchev.blogspot.com

    Security Blogger at CBS Interactive's ZDNet.com
    – http://zdnet.com/blog/security

    Security Blogger at Webroot Inc.
    – http://blog.webroot.com

    View full-size slide

  3. What you will learn after this
    presentation?

    The difference between Cyber Jihad and
    Cyberterrorism

    The top 5 most popular Cyberterrorism myths

    Just how easy is it to become a Cyber Jihadist

    The current state of the Cyber Jihadist threat

    The hacking tools and tactics used by Cyber
    Jihadists to support their cyber operations

    View full-size slide

  4. What you will learn after this
    presentation?

    Real life cases of Cyber Jihadist cyber operations
    in action

    Case study on the Global Islamic Media Front's
    (GIMF) cyber operations

    Are Cyber Jihadist's OPSEC (operational
    security) aware?

    The Intelligence Community's response

    View full-size slide

  5. Presentation Outline

    Cyber Jihad VS Cyberterrorism – the basics

    Introduction to Cyber Jihad

    The current state of the Cyber Jihad threat

    The hacking tools and tactics used by Cyber
    Jihadists to support cyber operations

    Real life cases of Cyber Jihadists' cyber
    operations in action

    View full-size slide

  6. Presentation Outline

    Case study on the Global Islamic Media Front's
    (GIMF) cyber operations

    View full-size slide

  7. Cyber Jihad VS Cyberterrorism

    Introduction to Cyber Jihad
     Propaganda/PSYOPS (psychological
    operations
     Potential target research
     Fund raising
     Recruitment/Radicalization/Training
     24/7/365 access to the Grid

    View full-size slide

  8. Overview of Cyber Jihadists' Literature

    The Technical Mujahid Magazine

    Cyber Jihadist's Encyclopedia

    Mujahideen Harvest Magazine

    INSPIRE Magazine

    View full-size slide

  9. Overview of Cyber Jihadists' Literature

    The Technical Mujahid Magazine

    Cyber Jihadist's Encyclopedia

    Mujahideen Harvest Magazine

    INSPIRE Magazine

    View full-size slide

  10. The Technical Mujahid Magazine

    View full-size slide

  11. The Technical Mujahid Magazine

    View full-size slide

  12. The Technical Mujahid Magazine

    View full-size slide

  13. The Technical Mujahid Magazine

    View full-size slide

  14. Cyber Jihadist's Encyclopedia

    View full-size slide

  15. Mujahideen Harvest Magazine

    View full-size slide

  16. INSPIRE Magazine

    View full-size slide

  17. Famous Cyber Jihadist Cases

    Irhabi007- caught and prosecuted

    Jihad Jane – caught and prosecuted

    GIMF members – caught and prosecuted

    View full-size slide

  18. Cyber Jihadists' Hacking Teams

    Osama Bin Laden's Hacking Crew

    Ansar-AL-Jihad Hackers Team

    HaCKErS aL AnSaR

    The Designer – Islamic HaCKEr

    Alansar Fantom

    View full-size slide

  19. Cyber Jihadists' Hacking Teams

    View full-size slide

  20. Cyber Jihadists' Hacking Teams

    View full-size slide

  21. Real life Cyber Jihadist Cyber Operations

    Al-Jinan's Electronic Jihad DoS Campaign

    Distribution of anti-infidel DIY Denial of Service
    Tools

    Muslims United Cyber DoS Campaign

    View full-size slide

  22. Real life Cyber Jihadist Cyber Operations

    View full-size slide

  23. Real life Cyber Jihadist Cyber Operations

    View full-size slide

  24. Real life Cyber Jihadist Cyber Operations

    View full-size slide

  25. Case study on GIMF

    First spotted in 2006 – released the “Night of
    Bush Capturing

    Releases the “Mujahideen Secrets Encryption
    Tool”

    Used primarily WordPress.com for hosting

    Relied on Archive.org for video hosting

    Abuse campaign to expose their social network

    View full-size slide

  26. Case study on GIMF

    View full-size slide

  27. Case study on GIMF

    View full-size slide

  28. Case study on GIMF

    View full-size slide

  29. Case study on GIMF

    View full-size slide

  30. Case study on GIMF

    View full-size slide

  31. Case study on GIMF

    View full-size slide

  32. Case study on GIMF

    View full-size slide

  33. Top 5 Most Popular Cyberterrorism Myths

    Cyberterrorists actively plot to take down the Grid

    Cyberterrorists exclusively use steganography

    Cyberterrorists poses sophisticated hacking skills

    Cyberterrorists use bullet-proof hosting services

    Cyberterrorists have access to good
    programmers with software engineering degrees

    View full-size slide

  34. Thank you for your time and attention!
    Dancho Danchev
    Email: [email protected]
    http://ddanchev.blogspot.com
    http://zdnet.com/blog/security
    http://blog.webroot.com
    http://twitter.com/danchodanchev

    View full-size slide

  35. Divider Slide Type
    Section Title Here

    View full-size slide