IDG News Service - Terror group al-Qaida has been left without a trusted operational channel on the Internet for distributing its media and propaganda, according to a terrorism expert.
"I really can't say for certain how or why this happened, other than that it involved apparently separate attacks on both the domain name and data server used by al-Qaida's trusted forum, Al-Shamukh," Evan Kohlmann of Flashpoint Partners said in an e-mail late Wednesday. That kind of coordinated event doesn't typically occur by happenstance, he added.
Other jihadi forums left online still allow "the rabble" to communicate with others, but none of them are fully trusted by al-Qaida, said Kohlmann who has spent over a decade tracking al-Qaida and other terrorist organizations.
The incident began in earnest about 72 hours ago, he said.
Kohlmann reported earlier this week in a message on Twitter that hackers hijacked the primary web domain used by the Shamukh chat forum, which disseminates propaganda on behalf of al-Qaida. He later reported that the entire website was unavailable, and two more top-tier jihadi web forums had also been mysteriously knocked offline, including the Arabic-language Ansar al-Mujahideen Network.
Kohlmann said on Wednesday that he was certain that al-Qaida has backup copies of the forum database, and there are various mirrors of their material still available online, such as aljahad.com/vb. But there is no other trusted channel left for al-Qaida to release new material through. Either Shamukh must be resurrected, or else al-Qaida must establish a direct relationship with a new forum, he added.
Shamukh is at present the critical linchpin in the network, Kohlmann said. "I'm sure that Shamukh will eventually be replaced by another forum, just as it replaced the former top-tier "al Faloja" forum last year," he added.
The list of potential suspects who may have brought down al-Qaida's online communications channels includes both government-sponsored hackers from the U.S. and the U.K., as well as independent cyber vigilantes, Kohlmann said. One frequent hacktivist who launches these types of attacks is known as th3j35t3r, he said.
Known as the Jester, th3j35t3r describes himself on his Twitter account as a "Hacktivist for good. Obstructing the lines of communication for terrorists, sympathizers, fixers, facilitators, and other general bad guys". Jester did not claim credit for the Shamukh hack on either the Twitter account or on his blog.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts