The software tools ISIS use revealed in a report. ISIS members always try to maintain their online anonymity by using various tools. Flashpoint well-known cybersecurity firm released a report on the tools ISIS members use to communicate each other through the internet.
To maintain operations Jihadists use various browsers such as Firefox, Google Chrome, Safari, etc. But among other browsers, their favorite one is TOR Browser, which hides IP address and other tracking details to the servers.
In the year 2008 TOR browser suddenly became more popular among Jihadists after Jihadist Deep Web forums focussed more on that particular browser.
In the same year, they developed their own encryption tool named Asrar AI-Mujahi-deen. They used to carry portable TOR browser on pen drives to browse the internet through internet cafes. Few Jihadists using Opera Browser, which has built in Free VPN service.
To mask their IP address behind the VPN jihadists started using CyberGhostVPN in the year 2014. Somebody in the Jihadi group found a privacy loophole in the CyberGhost VPN. It is just hiding the IP Address, but it doesn’t protect the Hard Disk Serial number of the computer. So they started using another additional free tool named HardDiskSerialNumberChanger to change their hard disk IDs.
For email communication Jihadis using Hushmail to encrypt the data. To automatically delete the contents of the smartphone after certain password failures they are using Locker app.
To spoofing GPS location with the fake one the are using Fake GPS Android app. And for the instant messaging Jihadists using Telegram messenger. Here you can download the complete report.