ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

In a security breach, Islamic State militants have reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online as revenge for killing of a top hacker of the terror group. 

Details of more than 54,000 Twitter accounts, including passwords, were published last week in what experts have described as a dangerous escalation of the global cyberwar. 

The group calling itself 'Cyber Caliphate', set up by ISIS member Junaid Hussain, encouraged its followers to seize control of the accounts and use them to spread Islamic State of Iraq and Syria propaganda, the Daily Express reported. Victims were forced to defenselessly watch as ISIS rhetoric appeared under their names. 

The jihadists also posted personal details on the social media platform -- including mobile phone numbers of the heads of the CIA, FBI and America's National Security Agency (NSA), the report said. Most of those affected are based in Saudi Arabia, but some are feared to be British. 

One victim, a half-British engineer based in Saudi Arabia was quoted as saying, "I am horrified at how they got hold of my details." 

Hussain, from Birmingham, steered the computer hacking division for the terror group before he was killed in August by a US drone carrying out a joint operation with Britain. Since the extremist's death the hacking group -- which briefly hacked a Pentagon Twitter account earlier this year -- appeared to keep a low profile.

The group also taunted the West before tweeting a link to the database of stolen Twitter accounts. "We need years to publish what we have. We will raise our flag in the heart of Europe," the group was quoted as saying…The account was quickly suspended by Twitter.

TimesOfIndia:

« Entrepreneur’s Guide To Surviving A Tech Bubble
Signal: The Snowden-Approved Crypto App Comes to Android »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

FireMon

FireMon

FireMon is the only agile network security policy platform for firewalls and cloud security groups providing the fastest way to streamline network security policy management.

Spirion

Spirion

Spirion offers data discovery, classification, and protection tools for your business's privacy, security, and compliance program to avoid gaps and risks.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Datacentrix

Datacentrix

Datacentrix provides end-to-end cybersecurity services for the operational technology (OT) and IT environments to monitor, assess and defend our customers' information assets.

DeepView

DeepView

DeepView delivers a unified platform for managing risk on digital platforms. One interactive secure portal allowing employees to engage their networks securely and compliantly.

Uptycs

Uptycs

Uptycs combines the open source universal agent, osquery, with a scalable security analytics platform for fleet visibility, intrusion detection, vulnerability monitoring and compliance.

Internet Crime Complaint Center (IC3)

Internet Crime Complaint Center (IC3)

The Internet Crime Complaint Center provide the public with a reporting mechanism to submit information to the FBI concerning suspected Internet-facilitated criminal activity.

Eunetic

Eunetic

Eunetic IT security solutions - we secure your websites, emails, domains and data.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

SecurityLoophole

SecurityLoophole

SecurityLoophole is an independent cyber security news platform with global coverage. Latest updates, reports, news and events related to cyber security.

Cognna

Cognna

Cognna's innovative platform is designed to empower you and your team, providing the tools you need to detect, prevent, and resolve threats with ease.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.

Cyber Security Unity (CSU)

Cyber Security Unity (CSU)

Cyber Security Unity (formerly the UK Cyber Security Association) is a new global community which has been set up to help unite the industry and combat the growing cyber threat.