Hit List: ISIS 'hacking division' Releases Details of 1,400 Military & Government Personnel.

screen-shot-2015-01-12-at-10-22-07-am.png?w=680&h=465

A group calling itself the Islamic State hacking division has published the details of 1,400 mostly US military and government personnel, urging supporters to attack those listed.

The spread sheet, published recently online, exposes names, email addresses, phone numbers and passwords and those listed include members of the marine corps, Nasa, the state department, air force and FBI. Supporters of Isis on Twitter seized on the breach, posting personal details of soldiers and government staffers and encouraging lone wolves to “act and kill”.

A person claiming to speak for the group told the Guardian the information was obtained from military and government databases, a claim on which US army officials threw doubt.
 “This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got were not taken by any cyber attack,” the army chief of staff, Gen Ray Odierno, said.
“This is no different than the other two,” he said, referring to earlier so-called hacks by Isis supporters in January and May.
“But I take it seriously because it’s clear what they’re trying to do ... even though I believe they have not been successful with their plan,” he said.

A computer security expert, Troy Hunt, also cast doubt on the alleged hack, suggesting much of it could have been scraped from existing data breaches or publicly available information.
“It’s pretty clear that it’s been aggregated from different sources,” he said. “It’s been put together on the basis of a .gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or government.
“They’re not even strong enough to have come from an online service - you can’t create a Gmail account, for example, with a password of less than eight characters, and here we’re seeing some passwords of three letters.”
The Pentagon said it was still looking into the incident.

“We don’t really have much information because most of the email addresses appear to be really old and passwords listed in the tweet don’t match up with our password strength requirements,” marine Lt Col Jeffrey Pool said. Also listed were at least eight Australians, including a member of the Victorian parliament and members of the Australian defence forces.
 
Australians on ISIS-aligned group's hit list include Justice minister Michael Keenan who says the government is aware of the list and spy agencies are looking into it.

Among the first to post the spreadsheet was the hacker Junaid Hussain, reportedly third on a CIA “kill list” of Isis members and supporters. The British national has been linked to the gunmen who attacked a prophet-Muhammad drawing contest in Texas in May.

Only the Isis leader Abu Bakr al-Baghdadi and its most prominent executioner, Mohammed Emwazi, are higher on the CIA list. 
Ein News:  http://bit.ly/1UCdL1d

« US & China Are Escalating Their Cyber War
Malaysian Police Work with Interpol & FBI to Foil Cyber Warfare Threat »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

British Insurance Brokers’ Association (BIBA)

British Insurance Brokers’ Association (BIBA)

BIBA is the UK’s leading general insurance intermediary organisation. Use the ‘Find Insurance‘ section of the BIBA website to find providers of cyber risk insurance in the UK.

Tinfoil Security

Tinfoil Security

Tinfoil is a simple, developer friendly service that lets you scan your website for vulnerabilities and fix them quickly and easily.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

QuintessenceLabs

QuintessenceLabs

QuintessenceLabs offers a suite of Data Security technology, products and solutions to secure digital information in-transit, at-rest or in-use.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Sum&Substance (Sumsub)

Sum&Substance (Sumsub)

Sum&Substance is a developer of remote verification solutions. Our technology allows online services around the world to meet regulatory requirements, prevent fraud and enhance customer confidence.

jobsDB.com

jobsDB.com

jobsDB Singapore is a search engine for jobs throughout Singapore.

CyberAcuView

CyberAcuView

CyberAcuView is a company dedicated to enhancing cyber risk mitigation efforts across the insurance industry.

Cognilytica

Cognilytica

Cognilytica’s Cognitive Project Management for AI (CPMAI) training and certification is recognized around the world as the best practices methodology for implementing successful AI & ML projects.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

inWebo

inWebo

inWebo is the specialist in multi-factor strong authentication (MFA). We guarantee the security of data and identities in a digital world with increasingly important economic and political stakes.

LegalByte

LegalByte

LegalByte is a leading provider of comprehensive legal and forensic services dedicated to addressing the complex challenges of the digital age.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.

ThreatView by Turaco Labs

ThreatView by Turaco Labs

ThreatView combines extensive experience in digital forensics with advanced analytics and threat detection capabilities to protect eCommerce websites.