ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted the personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them.

Newsweek reports that the Caliphate Cyber Army (CCA), formerly known as the Islamic Cyber Army, posted the personal details of fifty-five New Jersey police officers last week after hacking into the Web site of the New Jersey Transit police.

“The lone wolves r hungry for yr blood,” one tweet from the group stated. The list of personal details includes home addresses, phone numbers, names, and ranks. The Twitter accounts used to encourage the attacks have since been shut down.

New Jersey Transit said in a statement: “The NJ Transit Information System was not compromised, however some information was breached from an outside vendor. The New Jersey Transit police are working with the Department of Homeland Security and the FBI on this matter.”

The CCA has in the past carried out hacks on seemingly arbitrary online targets.

The group also recently threatened to take down Google but instead defaced the Web site of Add Google Online, a small Indian firm that offersSEO services.

Experts say the kind of attacks CCA carries out shows that the group has limited technical skills.

“We believe they gained access to vulnerable sites using elementary hacking methods and stumbled upon databases or spreadsheets with information they felt would appear threatening if released,” Raijin Rising, a pseudonymous member of the independent counterterrorism network Ghost Security Group, told Newsweek.

“Their activities shine a light on just how vulnerable websites are out there,” the member said. “It’s amazing how bad it is. I would estimate between 50 percent and 75 percent of websites are weak and vulnerable to simple attacks like these.”

I-HLS: http://bit.ly/1WtyQgL

« Now Ambulances Are Vulnerable To Hackers
Cybercrime Is Changing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Terranova Security

Terranova Security

Terranova is dedicated to providing information security awareness programs customized to your internal policies and procedures.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

OpenText

OpenText

OpenText is a leader in Enterprise Information Management software and a portfolio of related solutions for Information Governance, Compliance, Information Security and Privacy.

Digital Transformation EXPO (DTX)

Digital Transformation EXPO (DTX)

Digital Transformation EXPO showcases the latest technology and insight from the world’s leading brands and experts in DX.

Caulis

Caulis

Caulis FraudAlert is a cyber security solution. It can detect fraud and identity theft based on users’ online behaviour.

HSB

HSB

HSB offers insurance for equipment breakdown, cyber risk, data breach, identity recovery & employment practices liability.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Noblis

Noblis

Noblis is a dynamic science, technology, and strategy organization dedicated to creating forward-thinking technical and advisory solutions in the public interest.

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

StealthPath

StealthPath

StealthPath is focused on endpoint protection, securing the “implicit trust” vulnerabilities of current leading information security solutions.

Singularico

Singularico

Singularico help secure your software using the power of AI.

CLEAR

CLEAR

With more than 17 million members and a growing network of partners across the world, CLEAR's identity platform is transforming the way people live, work, and travel.

Hack-X Security

Hack-X Security

Hack-X Security provide IT risk assessment and Digital Security Services. We are a trusted standard for businesses that must protect their data from cyber-attacks.

ITRM

ITRM

ITRM are one of the UK’s top managed service providers and offer a range of award-winning IT solutions, from ad-hoc consultancy to cyber security.

Razilio

Razilio

Razilio is a boutique cybersecurity consultancy located in Sydney, Australia and serving the world.