ISIS Book of Terror for Wi-Fi Hacking and the use of spy tools

ISIS supporters are spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools.

ISIS militants are spreading a small package, titled Book of Terror, containing data of various spy tools, as well as tutorials on how to hack Wi-Fi networks in order to evade detection.

The Book of Terror has been posted online by the ISIS sympathizers a week ago, it is a 5,232-page PDF document.

“It’s difficult to tell if the guide is actually being used by the group, but the 5,232-page PDF was uploaded to a Pastebin-style site just over a week ago, and then linked to from an ISIS supporter forum on Saturday, the pseudonymous security researcher known as “Switched” told Motherboard.” reported Motherboard that first published the news. 

The package includes a guide to teach ISIS militant on how to use encryption to evade surveillance and a manual on the use of firing weapons.

Many Twitter accounts were used the by ISIS to spread copies of the Book of Terror, many websites and forums used for propaganda are also informing sympathizers about the existence of the package, which is written in English.

The package includes an entire section, titled “Secret Spy Devices,” related to electronic equipment. The section includes information on “high power” mobile phone jammer, for recording landline telephone calls and a spy camera hidden within a pen.

The experts who examined the Book of Terror confirmed that it is not a guide written from scratch by the ISIS members, instead it is a cut and paste from consumer electronic sites.

The Book of Terror also explains hot to crack Wi-Fi networks by using the popular Kali Linux distribution to hack WPA and WEP encrypted networks.

“If you live in an area where there are Muslims then refrain from hijacking networks in order to protect these Muslims from harm,”states the guide.

Personally, I’m not surprised that ISIS members are sharing such kind of manual, the information it contains are easy to find online so the diffusion of such documents doesn’t represent a further element of concern.

I’m instead worried by the exploitation of anonymizing networks like Tor and virtual currencies such as the Bitcoin. I fear that in the next months groups linked to the ISIS could acquire in the dark market strain of malware to use and customize for cyber espionage and sabotage.

Pierluigi Paganini

(Security Affairs – ISIS, Book of Terror)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds Ivanti EPMM, MDaemon Email Server, Srimax Output Messenger, Zimbra Collaboration, and ZKTeco BioTime flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Ivanti EPMM, MDaemon Email Server, Srimax Output…

3 hours ago

A critical flaw in OpenPGP.js lets attackers spoof message signatures

A critical flaw in OpenPGP.js, tracked as CVE-2025-47934, lets attackers spoof message signatures; updates have…

5 hours ago

SK Telecom revealed that malware breach began in 2022

South Korean mobile network operator SK Telecom revealed that the security breach disclosed in April…

8 hours ago

4G Calling (VoLTE) flaw allowed to locate any O2 customer with a phone call

A flaw in O2 4G Calling (VoLTE) leaked user location data via network responses due…

19 hours ago

China-linked UnsolicitedBooker APT used new backdoor MarsSnake in recent attacks

China-linked UnsolicitedBooker used a new backdoor, MarsSnake, to target an international organization in Saudi Arabia.…

1 day ago

UK’s Legal Aid Agency discloses a data breach following April cyber attack

The UK’s Legal Aid Agency suffered a cyberattack in April and has now confirmed that…

1 day ago