Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

screen-shot-2015-01-12-at-10-22-07-am.png?w=680&h=465

A group calling itself the Islamic State hacking division has published the details of 1,400 mostly US military and government personnel, urging supporters to attack those listed.

The spread sheet, published recently online, exposes names, email addresses, phone numbers and passwords and those listed include members of the marine corps, Nasa, the state department, air force and FBI. Supporters of Isis on Twitter seized on the breach, posting personal details of soldiers and government staffers and encouraging lone wolves to “act and kill”.

A person claiming to speak for the group told the Guardian the information was obtained from military and government databases, a claim on which US army officials threw doubt.
 “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” the army chief of staff, Gen Ray Odierno, said.
“This is no different than the other two,” he said, referring to earlier so-called hacks by Isis supporters in January and May.
“But I take it seriously because it’s clear what they’re trying to do ... even though I believe they have not been successful with their plan,” he said.

A computer security expert, Troy Hunt, also cast doubt on the alleged hack, suggesting much of it could have been scraped from existing data breaches or publicly available information.
“It’s pretty clear that it’s been aggregated from different sources,” he said. “It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government.
“They’re not even strong enough to have come from an online service - you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.”
The Pentagon said it was still looking into the incident.

“We don’t really have much information because most of the email addresses appear to be really old and passwords listed in the tweet don’t match up with our password strength requirements,” marine Lt Col Jeffrey Pool said. Also listed were at least eight Australians, including a member of the Victorian parliament and members of the Australian defence forces.
 
Australians on ISIS-aligned group's hit list include Justice minister Michael Keenan who says the government is aware of the list and spy agencies are looking into it.

Among the first to post the spreadsheet was the hacker Junaid Hussain, reportedly third on a CIA “kill list” of Isis members and supporters. The British national has been linked to the gunmen who attacked a prophet-Muhammad drawing contest in Texas in May.

Only the Isis leader Abu Bakr al-Baghdadi and its most prominent executioner, Mohammed Emwazi, are higher on the CIA list. 
Ein News:  http://bit.ly/1UCdL1d

« US & China Are Escalating Their Cyber War
Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Sogeti

Sogeti

Sogeti deliver solutions that enable digital transformation and offer cutting-edge expertise in Cloud, Cybersecurity, Digital Manufacturing, Quality Assurance, Testing, and emerging technologies.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

Crest International

Crest International

Crest is focused on professionalizing the technical cyber security market whilst driving quality and standards of organizations that operate within it.

Black Kite

Black Kite

Black Kite (formerly NormShield) provides comprehensive Security-as-a-Service solutions focused on cyber threat intelligence, vulnerability management and continuous perimeter monitoring.

RHEA Group

RHEA Group

RHEA Group offers aerospace and security engineering services and solutions, system development, and technologies including cyber security.

CNA Insurance

CNA Insurance

CNA offers a market-leading suite of cyber liability insurance products and risk control resources for businesses of all sizes.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

NetNordic Group

NetNordic Group

NetNordic is a Nordic system integrator focusing on solutions and services in the area of networking, smart data centers, cybersecurity, and unified communication.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

ImmuniWeb

ImmuniWeb

We Simplify, Accelerate and Reduce Costs of Security Testing, Protection and Compliance.

Quantum eMotion (QeM)

Quantum eMotion (QeM)

Quantum eMotion is a Montreal-based advanced developer leading the way towards a new generation of quantum-safe encryption for the quantum computing age.

Northdoor

Northdoor

Northdoor provides a comprehensive set of services around information security and works with leading global technology vendors to deploy and manage cyber security solutions.

Strata Information Group (SIG)

Strata Information Group (SIG)

Strata Information Group (SIG) is a trusted partner in IT solutions and consulting services.

Defence Innovation Accelerator for the North Atlantic (DIANA)

Defence Innovation Accelerator for the North Atlantic (DIANA)

The NATO DIANA accelerator programme is designed to equip businesses with the skills and knowledge to navigate the world of deep tech, dual-use innovation.

Driven Technologies

Driven Technologies

Driven is a cloud native service provider transforming the way companies leverage technology to improve business by securing, modernizing, and connecting applications, users, and data.

Xcede

Xcede

Xcede are global technology recruitment specialists. We connect companies with exceptional professionals who empower growth.