ISIS has long taken full advantage of secure communication tools, and utilized mainstream communication platforms in unexpected ways.

Extremist groups even develop their own software at times to tailor things like encrypted messaging to their specific needs.

One such project is the clandestine, unfortunately named communication tool MuslimCrypt, which uses an encryption technique called steganography to spread secret messages.

And while many of these homegrown tools don't live up to their promised protections, a new evaluation of MusilmCrypt by the Middle East Media Research Institute reaches a basic, but crucial conclusion: MuslimCrypt's steganography works.

MuslimCrypt was first released by unknown actors on January 20 in a private, pro-ISIS Telegram channel, and like other steganographic tools, it hides information in plain site.

MuslimCrypt doesn't come with a manual or provenance, so MEMRI researcher Marwan Khayat worked to trace the tool's history on Telegram, look into the users who talked about and posted it, vetted the tool in an attempt to confirm that downloading it wouldn't be dangerous, and then examined it in a software sandbox to determine how to use the tool.

The text above is a summary, you can read full article here.