ISIS deploys malware to hunt down its protester and opposition groups

ISIS deploys malware to find anti IS groups and factions in Syria

ISIS is using a malware to track down people and groups who oppose its ideology.  Researchers at Citizen Lab have analysed a sample malware which was sent to a anti-ISIS group called Raqqah is being Slaughtered Silently (RSS). Citizen Labs stated that the malware was written specifically for Windows PCs and was being emailed to all the opponents of ISIS within Syria and Iraq.

The sole purpose of this malware seems to be to expose the anti-ISIS groups or people and annihilate them.  RSS which is a rabid ISIS opposer and is situated within the ISIS stronghold of Raqqah is being primarily targeted by this malware.  Citizen Labs states that email sender claims to be  from a Canadian expat group which wants to help in the fight against ISIS.  The message body contains a URL and tell the receiver to check about the reports of ISIS.  On clicking this URL, the victim is lead to a file-sharing account with TempSend, and downloads an archive called slideshow.zip. The email being sent to the rebels is given below

???? ???? ..
??? ????? ??????? ??????? ?????? ?????? ???????? ????? ?????? ?? ????? , ???????? ??? ??????? ?????? ?? ???? ???? ?? ???? ??????? ?????? ???????? ?? ????? ????? ??? ???? ?????? ?? ????? ???? ??? ?????? ???? ??? , ????? ???? ?????? ????? ???? ???? ??? ???? ?????? ?? ????? .
????? ???? ???????? ???? ?????? ??? ????????? ???? ????? ?? ??? ???? ????? , ??? ???? ?????? ????? ?????? ????? ???????? ??? ????? ????? ????? ???? ??????? ????? ???????? ??? ???? , ??? ????? ???? ?? ??? ??????? ??? ????? ??? ???????? ????? ??? ???????? ??? ?????? ?? ??? ?? ??? ????? ???? ?? ??? , ???? ??????? ??? ???? ??????????? ??????? ??? ?????? ???????? ??????? ??? ?????? ??????https://tempsend [DOT]com/[Redacted]?? ?? ???????
[Name Redacted]

Translated English version

Thank you for your efforts to deliver a true picture of the reality of life in Raqqah.  As Syrians residing in Canada we are working with media because we believe in the importance of shedding light on the realities of life in Syria, and Raqqah in particular. We are preparing a lengthy news report on the realities of life in Raqqah. We are sharing some information with you with the hope that you will correct it in case it contains errors. We have prepared a map of the city of Raqqah, in addition to a preliminary report. We hope that you have a look at it with them and inform us of any errors. We also hope that if you happen to be on Facebook, you could provide us with the account of the person responsible for the campaign, if you don’t mind, so that we can communicate with him directly.
You can see a preliminary copy of the report on this linkhttps://tempsend [DOT]com/[Redacted]With all respect
[Name Redacted]

ISIS deploys a malware to find anti IS groups and factions in Syria

The slideshow.zip  contains a dangerous spyware called AdobeR1.exe alongwith some maps of Syria.  This plain vanilla AdobeR1 spyware then send back the victims IP address to its ISIS masters when the system is booted. Based on the IP address received from this IP address, the ISIS then pinpoints the rebel group or user by narrowing down the geolocation.

Citizen Lab says that since Syria is a very poor internet developed country and internet usage is scarce and predominantly available in Internet cafes, the ISIS can track down the user quite easily once the victim boots his/her system.

As said above, the malware is quite plain with no obfuscation processes, In addition, the malware uses the old PKWARE implementation of zip encryption, which is not particularly secure. The password for the zipped file is also present in the binary without encryption or obfuscation.

Citizen Labs attributes this malware to three sources

  • Pro-regime / regime-linked malware groups
  • ISIS-linked hackers
  • Other, unknown actors

Based on the case study, Citizen Labs says that the most probable originator of the malware is ISIS.

Resource Citizen Lab.

1 COMMENT

  1. With the help of Allies, can we do sabotage the malware to send false information back to ISIS servers? Find where ISIS members live and inject the geolocation of those homes into the malware. Send an attack on those listening servers and take them down.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Read More

Suggested Post