ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

In a security breach, Islamic State militants have reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online as revenge for killing of a top hacker of the terror group. 

Details of more than 54,000 Twitter accounts, including passwords, were published last week in what experts have described as a dangerous escalation of the global cyberwar. 

The group calling itself 'Cyber Caliphate', set up by ISIS member Junaid Hussain, encouraged its followers to seize control of the accounts and use them to spread Islamic State of Iraq and Syria propaganda, the Daily Express reported. Victims were forced to defenselessly watch as ISIS rhetoric appeared under their names. 

The jihadists also posted personal details on the social media platform -- including mobile phone numbers of the heads of the CIA, FBI and America's National Security Agency (NSA), the report said. Most of those affected are based in Saudi Arabia, but some are feared to be British. 

One victim, a half-British engineer based in Saudi Arabia was quoted as saying, "I am horrified at how they got hold of my details." 

Hussain, from Birmingham, steered the computer hacking division for the terror group before he was killed in August by a US drone carrying out a joint operation with Britain. Since the extremist's death the hacking group -- which briefly hacked a Pentagon Twitter account earlier this year -- appeared to keep a low profile.

The group also taunted the West before tweeting a link to the database of stolen Twitter accounts. "We need years to publish what we have. We will raise our flag in the heart of Europe," the group was quoted as saying…The account was quickly suspended by Twitter.

TimesOfIndia:

« Entrepreneur’s Guide To Surviving A Tech Bubble
Signal: The Snowden-Approved Crypto App Comes to Android »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Venafi

Venafi

Venafi is a world-class cyber-security company dedicated to protecting machine identities for our hyper-connected digital economy.

LexisNexis Risk Solutions

LexisNexis Risk Solutions

LexisNexis Risk Solutions provides technology solutions for Anti-Money Laundering, Fraud Mitigation, Anti-Bribery and Corruption, Identity Management, Tracing and Investigation.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

FixMeStick

FixMeStick

FixMeStick is a virus removal device, a USB key that removes malware conventional antivirus software often can’t detect.

Nation-E

Nation-E

Nation-E offers innovative cyber security solutions for industrial installations, critical infrastructure and smart grids.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Digital Innovation Hub Slovenia (DIH)

Digital Innovation Hub Slovenia (DIH)

DIH Slovenia is a central hub providing services to grow digital competencies in areas including robotics, IoT, cyberphysical systems and cybersecurity.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CS3STHLM

CS3STHLM

CS3STHLM is the Stockholm international summit on Cyber Security in SCADA and Industrial Control Systems.

Palitronica

Palitronica

Palitronica build cutting-edge hardware and breakthrough software that revolutionizes how we defend critical infrastructure and key resources.

LayerX Security

LayerX Security

LayerX's user-first browser security platform turns any browser into the most protected & manageable workspace, by providing real-time monitoring and governance over users’ activities on the web.

Heron Technology

Heron Technology

Heron Technology are a technology solutions consultancy with core competencies in the areas of Cyber Security and Digital Aviation.

Myrror Security

Myrror Security

Myrror Security is a software supply chain security solution that aids lean security teams in safeguarding their software against breaches.

Applied Insight

Applied Insight

Applied Insight work closely with government agencies and industry to overcome technical and cultural hurdles to innovation, empowering them with the latest cloud, data and cyber capabilities.

CyberCure

CyberCure

CyberCure provide specialised roles and services to manage your organisations cybersecurity requirements and professional advisory services in governance, risk and compliance.