Islamic terrorists are arming themselves with the technical tools and expertise to attack the online systems underpinning Western companies and critical infrastructure, according to a new study from the Institute for Critical Infrastructure Technology.
The goal of the report was to bring awareness to "a hyper-evolving threat" said James Scott, ICIT co-founder and senior fellow.
Dark web marketplaces and forums make malware and tech expertise widely available and — with plenty of hackers for hire and malware for sale — technical skills are no longer required. A large-scale attack could be just around the corner, said Scott.
Read More from CNBC: Islamic State Turns to Selling Fish, Cars to Offset Oil Losses
"These guys have the money to go on hacker-for-hire forums and just start hiring hackers," he said.
U.S. authorities are well-aware of the rising threat posed by Islamic terrorists armed with advanced cybertools. In April, Defense Secretary Ashton Carter declared a cyberwar against the Islamic State group, or ISIS.
Hacker Group Anonymous Declares War on ISISNov. 20, 201501:54
Ransomware chatter rose to prominence on dark web jihadi forums around the fall of 2015 and continues to be a topic of debate, particularly among members of ISIS and Boko Haram.
"I had the same position that I have right now with this in December of last year with regards to ransomware hitting the health-care sector," said Scott. "We were seeing the same exact thing."
Much of the chatter on jihadi chat boards comes from Europeans and Americans, often social outcasts living vicariously through the online reputation of their handle — including disenfranchised teens or jailhouse Muslim converts turned radicals, Scott said. They may not have strong coding skills, but they have access to Western institutions and businesses and are looking to leverage that access to serve ISIS.
Read More from CNBC: After Anonymous, U.K. Threatens ISIS With Cyberattack
An example of the sort of conversation that takes place on Islamic dark web forums involved a cleaner in Berlin who worked the overnight shift and wanted to know how they could help, said Scott. Others chimed in, explaining how the janitor could load malware onto a USB device and plug it into a computer to allow them to remotely hack into the network.
"That is the kind of insider threat that we are going to be facing," said Scott. "That is what they are seeing as the next step — an army of insider threats in the West."
Though not known for being particularly sophisticated in their use of technology — beyond the use of encrypted messaging services and creating malicious apps — Islamic terrorists are now aggressively seeking ways to bridge gaps in their knowledge, said Scott. This may come in the form of hiring hackers, recruiting tech-savvy teens and educating new recruits.