The attack that was supposed to occur on the 11th failed to materialize, even though sites such as al-jinan.net have distributed packets like "E-Jihad30.exe".
F-Secure reports that "this tool creates a botnet using a server at jo-uf.net — a domain registered to Iraq. However, we've been monitoring this server all day and its IP address continues to point to 127.0.0.1. So at least regarding this botnet, nothing is gonna happen."
The "Electronic Jihad Program" is part of the long-term vision jihadi Web site Al-jinan.org has to use the Internet as a weapon, something that affects any organization that relies on the Web. Electronic Jihad allows users to target specific IP addresses for attack in order to take any servers running at those IP addresses offline. The application even includes a Windows-like interface that lets users choose from a list of target Web sites provided via the Al-jinan site, select an attack speed (weak, medium, or strong), and the click on the "attack" button."
This is all an attempt to manipulate large masses of people to take part in a distributed Denial of Service attack, and serve the purposes of the tool's creators. In other words, they actually expect people to run the trojan / virus / work /whatever themselves.
And again, script kiddies have been doing this for years, and have had little effect on the "Interblag".
Sources:
http://ddanchev.blogspot.com/2007/08/cyber-jihadist-dos-tool.html
http://www.theregister.co.uk/2007/11/12/cyber_jihad_awol/
http://isc.sans.org/diary.html?storyid=3633
http://www.debka.com/headline.php?hid=4723
Monday, November 12, 2007
The Blogosphere is safe for another day
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment