Killings, Torturing, and Smuggling: How an Infostealer Exposed an ISIS Cell’s XMPP Network

How an Infostealer Exposed an ISIS Cell’s XMPP Communications in Lebanon
Counter-Terror Intelligence / Hudson Rock Investigators / ISIS Cell Exposure

Executive Summary

A compromised machine in Lebanon – most likely belonging to a person named قسورة (Qasura), a local ISIS cell commander – contained explosive synthesis manuals, jihadist propaganda, and locally stored XMPP chat logs that should have been encrypted. The chats reveal Qasura receiving direct instructions from Syria-based operatives, coordinating IED attacks that killed security personnel, requesting religious permission for torture, managing cross-border smuggling routes, handling money transfers through Turkey and Syria, and shipping detonator components across the region. Through this single compromised machine, we were able to map the entire cell hierarchy from local commander to senior leadership.

Geographic Network – Operational Footprint

Locations extracted from conversation analysis

Locations
Cell / ID File
Operations
Financial
Border
Contact / Actor
Communication Routes
IED Supply Chain
Money Transfers
Smuggling / Border
Aid / Contact
ID File Data

The Network Exposed

The compromised machine contained locally stored XMPP chat logs from “chatwith.im” and “conversations.im” accounts. While these encrypted messaging platforms are designed for secure communications, someone appears to have created a backup copy of these conversations and stored it on the compromised machine – giving us complete access to years of operational communications and the ability to map this terror cell’s complete organizational hierarchy.

ISIS Cell Network Structure

Reconstructed from Conversation Analysis

Avatar
أمير المؤمنين
Supreme Leader
Caliph
Avatar
العـم
“The Uncle”
Senior Commander
Avatar Syria
أبو محمد
Abu Muhammad
Operations Coordinator
abo.mohamd332/334
التجهيز Equipment
Avatar Syria
سيف
Sef77
Wilaya Commander
sef77@chatwith.im
الاقتصاد Finance
Avatar
أبو عثمان
Abu Uthman
Sharia Judge
saker33/3333
الشرعية Sharia
Avatar Lebanon
ولاية لبنان
Lebanon Province
قسورة (Qasura) – Cell Commander
baqeya33/3333/4444baq
التجهيز Equipment الاقتصاد Finance
Avatar Syria
ولاية الشام
Syria Operations
عبد الله (Abdullah) – Coordinator
abdallo88
التصنيع Manufacturing الإعلام Media
Recovered organizational structure detailing the flow of equipment and command between Lebanon and Syria.

🔍 Why We Believe This Is Qasura’s Machine

Several indicators point to قسورة (Qasura) as the most likely owner of this compromised endpoint:

  • Consistent receiver role: In every conversation, the “baqeya” accounts (baqeya33baq, baqeya3333baq, baqeya4444baq) are the ones receiving instructions, shipments, and guidance – not giving them
  • Lebanon geolocation: The machine’s IP address (213.204.111.35) geolocates to Lebanon, matching Qasura’s described role as the “Wilayat Lebanon” cell commander
  • Local backup perspective: The conversation logs are stored from the perspective of the baqeya accounts, with their messages appearing as the local/sender side
  • Credit for local operations: Syria-based operatives explicitly credit him for IED attacks and component shipments originating from Lebanon
  • Account ownership pattern: Multiple baqeya accounts on the same machine suggests one person managing several operational identities

Throughout these conversations, Qasura emerges as the Lebanon-based cell commander, receiving operational instructions from Syria-based handlers like abo.mohamd332, getting credit for IED attacks that killed security personnel, receiving shipments of detonator components, and consulting religious authorities on matters of torture and “war spoils.” The conversations position him at the center of the cell’s Lebanon operations – and his infected endpoint likely exposed the entire network.

The nature of these conversations, combined with the files found on the machine, strongly indicates ISIS (Islamic State) affiliation. The compromised machine contains folders named after senior ISIS figures, including “أرشيف الأمراء” (Archive of the Emirs) with content from known ISIS ideologues like Turki al-Bin’ali. The conversations use ISIS-specific terminology including “Bay’ah” (بيعة – pledge of allegiance), “Fay'” (فيء – war spoils), references to “Wilayat” (ولايات – provinces), and the “Amir al-Mu’minin” (أمير المؤمنين – Commander of the Faithful). References appear to the Ajnad Foundation – ISIS’s official media production arm. Even the account naming convention – “baqeya” (baqeya33baq, etc.) – directly references the ISIS slogan “باقية وتتمدد” (remaining and expanding).


Deep Dive Into The Conversations

The following sections present direct excerpts from the recovered XMPP chat logs, with translations. Each conversation block reveals a different aspect of the cell’s operations – ordered by criticality from killings and attacks to routine communications.

1

IED Attacks & Component Supply Chain

baqeya3333baq ↔ abo.mohamd332 • Oct-Dec 2021
🔴 CRITICAL

In this exchange, abo.mohamd332 (a Syria-based operative) explains the dual-detonation workflow to baqeya3333baq (the Lebanon cell), then announces “good news” – IED devices supplied by the Lebanon cell have already been deployed in multiple locations. He shares what appears to be photo/video evidence (via encrypted AESGCM link) of a vehicle attack, stating: “This car contains 2 officers and personnel… Thank God they’re all dead.” The Lebanon cell member responds with celebration, and abo.mohamd332 confirms: “God willing, you will have a share in killing them”-directly crediting the Lebanon cell for the deaths.

Full conversation showing IED attack discussion and celebration
Complete exchange: IED technical discussion, attack confirmation, and shared evidence (November 10, 2021) – Translated from Arabic

Part 1: IED Technical Discussion

يتم تفجير الجهاز عن بعد ويديه اشارة ويبدا العد التنازلي اما نصف ساعة او ٥ دقايق حسب ما يحدده الاخ ثم يفجر الجهاز الثاني بامكانك التحكم في قيمته
abo.mohamd332: “The device is detonated remotely and he gives the signal. The countdown begins, either half an hour or 5 minutes, depending on what the brother sets, then he detonates the second device. You can control its value.”
تتحكم في قيمته في الوقت؟
baqeya3333baq: “You can control its value – in time?”
أسأل الله أن ييسر
baqeya3333baq: “I ask God to make it easy. Amen.”
تتحكم في وقت التايمر. مثلا تخليه عشر دقايق ويفتح
abo.mohamd332: “You can control the timer time. For example, leave it for ten minutes and it will open.”

Part 2: Attack Announcement & Evidence

ابشرك الأجهزة يلي بعثتهن نكلت فيهم بأكثر من مكان
abo.mohamd332: “I have good news for you: the devices I sent have been tampered with. In more than one place.”
[aesgcm://share.conversations.im/…]
abo.mohamd332: [Shares encrypted image/video link – appears to be evidence of the attack]
الحمدلله. الله يكتب اجرك
baqeya3333baq: “Praise be to God. May God grant you Paradise.”
هذه السيارة فيها 2 ضباط وعناصر
abo.mohamd332: “This car contains 2 officers and personnel.”
الحمد لله كلهم فطسوا
abo.mohamd332: “Thank God they’re all dead.”

Part 3: Celebration & Shared Credit

الحمدلله. هذه الاخبار تسر القلب
baqeya3333baq: “Praise be to God. This news has gladdened our hearts.”
هذا كان البارحة فقط. قربوا على الانتهاء من الذين ارسلتهم
abo.mohamd332: “This was just yesterday. They’re almost finished with the ones I sent.”
نسال الله ان يمكنكم عليهم
baqeya3333baq: “We ask God to give you power over them.”
الله يكتب لك اجر قتلهم
abo.mohamd332: “God willing, you will have a share in killing them.”
آمين آمين
baqeya3333baq: “Amen. Amen.”

Part 3: IED Component Supply Chain

The same channel was used for coordinating large-scale IED component shipments from Lebanon to Syria/Iraq – documenting quantities of receivers (100+), timers (80+), and requests for thermal sniper scopes:

المؤقتات وصلوا جيديين… ٢٠ مؤقتات حديثة
baqeya3333baq: “The timers arrived, they’re good… 20 modern timers.”
على ٨٠ اخي غير يلي رح دزهم
abo.mohamd332: “Order 80 [timers], brother, in addition to what you’re sending.”
بعثنا ١٠٠ مستقبل
baqeya3333baq: “We sent 100 receivers.”
يلتقى حوليكم ناظور قناصة حرارريييي؟
abo.mohamd332: “Can you find thermal sniper scopes around you?”
2

Attack Planning: Ambushes, IEDs, Poisoning

baqeya4444baq ↔ sef77 • February 8, 2022
🔴 CRITICAL

Senior commander (sef77) instructs Lebanon cell commander on planned operations including ambushes, IED attacks on patrols/headquarters, and poisoning informants. Cell confirms readiness with silencers and poison preparation.

Conversation showing attack planning discussion
Attack planning: ambushes, IEDs, and poisoning operations (February 2022) – Translated from Arabic
اخي نعمل على القديم بس اذا عملنه بخير مكان راح نطلب منكم عمل امني او عسكري يكون بعيد عنكم ولن يشكو انهو منكم ككمين او عبوه او ماشابه ذالك تكون على دوريه او مقر الشي من هد القبيل من اجل جس النبض ومن اجل قدح الشراره
sef77: “Brother, we’re working on the old plan, but if we do something good, we’ll ask you to do a security or military operation far from your area, something that won’t raise suspicion that it’s from you. It could be an ambush, an IED, or something similar, targeting a patrol or headquarters – to test the waters and spark something.”
الحمدلله في كواتم ومعظم الامور جاهزة
baqeya4444baq: “Thank God, we have silencers and most things are ready.”
كنا نعمل على تجهيز سموم من اجل تسميم بعض المخبرين الخنازير وبطريقة لا تثير الشكوك علينا
baqeya4444baq: “We were working on preparing poisons to poison some of the pig informants, in a way that won’t raise suspicion on us.”
يعني اخي اذا قدرنا نصفي اي طاغوت بشكل سري بدون ما يصير تأثير علينا. نفعل؟
baqeya4444baq: “So brother, if we can eliminate any tyrant secretly without affecting us, should we do it?”
اي اخي بس يكون العمل حصرن بشرافك ولا تخبر الكل المعلومه على قدر الحاجه
sef77: “Yes brother, but the work must be exclusively under your supervision. Don’t tell everyone – information on a need-to-know basis.”
3

Religious Rulings: Finance, Purity & Torture

baqeya33baq ↔ saker33/saker3333 • May-June 2021
🔴 CRITICAL

Lebanon cell member baqeya33baq consults extensively with sharia advisor saker33 (Abu Uthman) seeking religious rulings (fatwas) on various topics – from the permissibility of cryptocurrency trading, to ritual purity concerns (madhi/wadhi), to torture and mutilation of prisoners. The conversations reveal a structured process where even mundane personal matters require religious guidance from the group’s sharia authority.

Conversation showing fatwa requests on various topics
Religious consultations covering cryptocurrency, purity laws, and torture (May-June 2021) – Translated from Arabic

Torture & Mutilation Permission

هل يجوز تعذيب الكفار والمرتدين عند اسرهم كقطع يديهم و سلخ اجسادهم ثم قتلهم؟ او تمثيل بجثثهم بعد موتهم ثأرا لله ولدينه؟
baqeya33baq: “Is it permissible to torture disbelievers and apostates when capturing them, such as cutting their hands and flaying their bodies then killing them? Or mutilating their corpses after death as revenge for God and His religion?”
وبالنسبة للتمثيل فالأحوط عدمه… قال تعالى وإن عاقبتم فعاقبوا بمثل ما عوقبتم به ولئن صبرتم لهو خير للصابرين
saker3333: “Regarding mutilation, it’s more cautious not to do it… God said: ‘And if you punish, punish with an equivalent of that with which you were harmed. But if you are patient, it is better for those who are patient.'”
فهنا دليل انه يجوز العقوبة بالمثل ولكن الصبر افضل فالافضل عدم التمثيل
saker3333: “So here is evidence that punishment in kind is permissible, but patience is better. Therefore, it is preferable not to mutilate.”
4

Explosives Manufacturing Expertise

baqeya33baq/baqeya3333baq ↔ abdallo88 • May-July 2021
🟠 HIGH

Repeated requests to connect with an explosives/rocket manufacturing expert. Discussion of an expert in the “north” under security pressure (two raids). Request for manufacturing manuals.

واذا في اخ مختص بمجال تصنيع الصواريخ والمتفجرات وتقدروا تربطونا فيه والله يجزيكم الخير
baqeya33baq: “And if there’s a brother specialized in manufacturing rockets and explosives, could you connect us with him? May God reward you.”
والله يا اخي خبرنه الاخوه في واحد بصناعت المتفجرات وضعو الامني سيء هوه بشمال وصلر علي بهي الفتره انزال مرتين وهلا ماعم يفتح نت
abdallo88: “By God, brother, the brothers told me there’s one in explosives manufacturing but his security situation is bad. He’s in the north and has had two raids on him recently. Now he’s not opening the internet.”
5

War Spoils (Fay’): Robbery & Kidnapping

baqeya3333baq ↔ sef77 • Oct-Dec 2021
🟠 HIGH

Detailed discussion of “fay'” (war spoils)-money stolen from “tyrants.” Distribution formula: 25% cell, 25% local wilayah, 25% regional wilayah, 25% central treasury. Also discusses kidnapping for ransom infrastructure.

اذا قمنا بعملية سلب مال من بيت طاغوت ولا يوجد خطورة في العملية. يعد المال فيء؟ وهل يقسم المال عندنا على العمل الجهادي ام نرسله لكم؟
baqeya3333baq: “If we carry out an operation to steal money from the house of a tyrant and there’s no danger in the operation, is the money considered fay’ (war spoils)? And should the money be divided among us for jihadi work or should we send it to you?”
الترتيب عند الولايات مال الفيء يصرف ربع على المجموعه التي سلبت لتقويتها وربع للولايه الصغره… وربع للولايه الكبره وربع لبيت المال
sef77: “The arrangement in the provinces: fay’ money is distributed-a quarter to the group that stole to strengthen itself, a quarter to the small wilayah… a quarter to the large wilayah, and a quarter to the treasury.”
يعني انته تقدر اذا صار عندك مال تقدر تشتري ارض او بيت وساوي سجن وتشتري سياره وتخطف وساوم
sef77: “Meaning, if you get money, you can buy land or a house and make a prison, buy a car and kidnap and demand ransom.”
6

Hazardous Materials Discussion

nnn1111122222 ↔ asef55 • January 6-7, 2022
🟠 HIGH

Brief but significant discussion about an unidentified hazardous material. The Lebanon cell member assesses it as radioactive and requiring large facilities, possibly a poison with an incorrect name.

اخي مستحيل تكون هاي هي المادة… واذا افترضنا انها هي. فما نقدر نستفيد منها لان بدها معامل ومكنات ضخمة والمادة مشعة وخطيرة جدا
nnn1111122222: “Brother, it’s impossible that this is the material… And if we assume it is, we can’t benefit from it because it needs laboratories and huge machinery, and the material is radioactive and very dangerous.”
بدك تحاول تتأكد من الاسم واللون وشكل البلورات او الكثافة احتمال تكون سم هذه المادة والاسم في خطأ
nnn1111122222: “You need to try to verify the name, color, crystal shape, or density. This material might be a poison and the name is wrong.”
7

Money Transfers to Syria

baqeya3333baq ↔ kaled44 • June-July 2021
🟡 MEDIUM

Financial transfers from Lebanon to Syria (Deir ez-Zor area). Includes specific money transfer office name, location, and recipient name for hawala-style transfers.

المكان البصيرة المكتب الميسر (حصرا) الاسم احمد ابراهيم حمادي دير الزور الشرقي
kaled44: “Location: Al-Busayrah. Office: Al-Maysar (exclusively). Name: Ahmad Ibrahim Hammadi. Eastern Deir ez-Zor.”
ياغالي استلمت المبلغ جزاك الله خيرا
kaled44: “Dear one, I received the amount. May God reward you well.”
8

Recruitment & Cell Management

Multiple conversations • 2021-2022
🟡 MEDIUM

Processing new recruits for bay’ah (pledge of allegiance to ISIS), CV/biography requirements, encryption protocols, endorsement (tazkiya) requirements, weapons inventory, smuggling routes, and hideout assessments.

Bay’ah (Pledge) Processing

اخي في اخوة جديدة بدها تبايع ان شاء الله
baqeya33baq: “Brother, there are new brothers who want to pledge allegiance, God willing.”
تبعثلي سيرهم الذاتية… شفرهن
abo.mohamd334: “Send me their CVs… Encrypt them.”
اخين… واذا ماحدا يعرفه غير أخ يذكر كامل معرفته بيه
abo.mohamd334: “Two brothers [for endorsement]… and if only one brother knows him, he should describe his full knowledge of him.”

Cell Management & Smuggling

Conversation showing weapons and equipment requests
Weapons inventory and smuggling route inquiries (December 2021) – Translated from Arabic
بدي تفاصير التسليح وتجهيز من سلاح وذخار ومواد بنواعه ونواضير… والاجهزه المرسل ولمستقبل… وكم اخ متفرغ ومن منهم ماعلي شي ومن منهم مطلوب وهل لديكم مخافي
sef77: “I need details of armament and equipment-weapons, ammunition, materials of all types, binoculars… and transmitters and receivers… How many dedicated brothers? Which of them has nothing [against them] and which is wanted? Do you have hideouts?”
وما هيه الامكانيات لوصولكم للحدود من جهت بيت جن… وهل لديكم معرفه بمهربين
sef77: “And what are your capabilities to reach the border from the Beit Jann side?… Do you have knowledge of smugglers?”
اخي من شان المغانيط طلعت ضعيفه بدنه ياه اقوه من هيك
abdallo88: “Brother, regarding the magnets, they turned out weak. We need stronger ones.”

Key Players & Communication Network

Actor Accounts Role Location
Avatar
Qasura قسورة Likely Machine Owner
Lebanon Cell Leader
(Likely Machine Owner)
Lebanon
Avatar
Abu Muhammad أبو محمد
Operations Coordinator
Bay’ah Handler
Syria/Iraq
Avatar
Sef سيف
Wilaya Commander
Finance & Strategy
Syria (Shaam)
Avatar
Abu Uthman أبو عثمان
Sharia Judge
Religious Authority
Mobile
Avatar
Abdullah عبد الله
Syria Field Coordinator Syria
Avatar
Khaled خالد
Finance / البصيرة Al-Busayra, Syria

Identified Kunyas (Aliases)

  • قسورة (Qasura) – Lebanon Cell Commander / Likely Machine Owner
  • أبو محمد (Abu Muhammad) – Operations Coordinator / Bay’ah Handler
  • أبو عثمان (Abu Uthman) – Sharia Judge / Religious Authority
  • سيف (Sef) – Wilaya Commander / Finance Lead
  • عبد الله (Abdullah) – Syria Field Coordinator
  • خالد (Khaled) – Finance Operative / Al-Busayra
  • العم (Al-‘Am / “The Uncle”) – Senior Commander
  • أبو ماريا (Abu Maria) – Former Emir

Real Names from ID/Barcode Files

  • مـوفق الباير محمد خير مريم المحمود (Mowafaq Al-Bayer) – DOB: 1-3-1979, Syrian National ID: 12020007918
  • حمزه الخميس العويد محمد هناء العرنوس (Hamza Al-Khamis Al-Owaid) – DOB: 15-4-2005, Syrian National ID: 14030087260
  • كنان عبد السلام ياسين لينا عمر (Kenan Abdel Salam Yassin) – DOB: 2-5-1987, Damascus, Syrian National ID: 03120035634
  • نور ساطي (Nour Sati) – DOB: 05/07/2019, Location: Kamid al-Lawz, Western Bekaa
  • فاطمة محمد موسى (Fatima Muhammad Musa) – Location: Azaz, Syria

Additional Findings

Dark Web & Hacking Tools

The machine contained offensive security and anonymity tools:

  • Kali Linux 2021.3 installer
  • Katana tool with TorSearchEngines.txt (list of Tor search engines)
  • SQLMap (SQL injection tool)
  • ProtonVPN

Supporting Evidence: Chemistry & Explosives Files

Beyond the conversations, the machine contained files that raised immediate red flags:

Chemistry & Explosives Evidence 1 Chemistry & Explosives Evidence 2
⚠️ Suspicious Files Discovered
📄
Roc equations.pdf
Rocket trajectory calculations and propulsion formulas
📄
ATF – List of Explosive Materials
US Bureau of ATF official explosives registry
📄
Urea peroxide arabic.pdf
Explosive synthesis manual in Arabic with religious framing
📄
ONE HUNDRED MOST COMMONLY FOUND EXPLOSIVE MATERIALS
Comprehensive list of shock-sensitive materials

Urea Peroxide Synthesis Manual (Arabic)

A complete synthesis manual for urea peroxide, a primary explosive:

📄 Urea Peroxide Synthesis Manual EXPLOSIVE CONTENT
بسم الله الرحمن الرحيم

(In the name of God, the Most Gracious, the Most Merciful)

“Urea peroxide or carbamide peroxide is a white crystalline material produced by mixing urea with hydrogen peroxide at concentrations above 30%.”
“It can be used as an explosive with a detonation velocity between 3,000 and 4,000 meters per second.”
“For detonation, it requires a compound detonator with an activating charge to explode.”
SYNTHESIS RATIO: 3 parts hydrogen peroxide to 2 parts urea
Example: 30g H₂O₂ (50%) + 20g urea

The document ends with religious framing typical of jihadist technical manuals.


Conclusion: The InfoStealer Blindspot

Through a single InfoStealer infection on a machine in Lebanon, we recovered the complete operational communications of an active ISIS cell – conversations that reveal not just plans, but confirmed attacks with casualties.

1. Confirmed IED Attacks

Direct evidence of successful IED attacks, including photo/video evidence shared between operatives and celebration of killed officers: “Thank God they’re all dead.”

2. Cross-Border Supply Chain

A documented pipeline of IED components – 100+ receivers, 80+ timers – flowing from the Lebanon cell to operatives in Syria, with the Lebanon cell directly credited for attack casualties.

3. Sharia-Sanctioned Violence

Religious rulings explicitly authorizing torture, including permissions for burning, dismemberment, and the treatment of captured enemies as “fay'” (war spoils).

4. Complete Cell Hierarchy

Full organizational mapping from Qasura (the likely machine owner) through wilaya leadership (Sef77) to senior command (“The Uncle”), with bay’ah pledge processing and recruitment protocols – all exposed through a single infected endpoint.

The Power of InfoStealer Intelligence

The cell used every recommended operational security measure: encrypted XMPP messaging via conversations.im and chatwith.im, OMEMO encryption, and separate accounts for different functions. But a single InfoStealer infection – most likely on Qasura’s machine – uncovered the entire cell operational infrastructure.

This investigation demonstrates the critical value of InfoStealer intelligence for counter-terrorism. One compromised endpoint revealed an entire terror cell: confirmed attacks with casualties, cross-border supply chains, religious rulings sanctioning violence, and complete organizational hierarchies from local commanders to senior leadership.

The same malware infrastructure that exfiltrates corporate credentials can – and does – capture terrorist communications. For intelligence agencies and counter-terror units, InfoStealer data feeds represent a massively underutilized resource that no amount of encrypted messaging can protect against.


To learn more about how Hudson Rock protects companies from imminent intrusions caused by info-stealer infections of employees, partners, and users, as well as how we enrich existing cybersecurity solutions with our cybercrime intelligence API, please schedule a call with us, here: https://www.hudsonrock.com/schedule-demo

Hudson Rock also provide access to various free cybercrime intelligence tools that you can find here: www.hudsonrock.com/free-tools

Don’t Stop Here

More To Explore

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise

BE THE FIRST TO KNOW

Get FREE access to Cavalier GPT

Stay informed with the latest insights in our Infostealers weekly report.

Receive a notification if your email is involved in an Infostealer infection.

No Spam, We Promise