ISIS Hackers Publish US Police Officers’ Private Details

ISIS hackers have posted the personal details of US officials online, encouraging the group’s supporters to carry out “lone wolf” attacks against them.

Newsweek reports that the Caliphate Cyber Army (CCA), formerly known as the Islamic Cyber Army, posted the personal details of fifty-five New Jersey police officers last week after hacking into the Web site of the New Jersey Transit police.

“The lone wolves r hungry for yr blood,” one tweet from the group stated. The list of personal details includes home addresses, phone numbers, names, and ranks. The Twitter accounts used to encourage the attacks have since been shut down.

New Jersey Transit said in a statement: “The NJ Transit Information System was not compromised, however some information was breached from an outside vendor. The New Jersey Transit police are working with the Department of Homeland Security and the FBI on this matter.”

The CCA has in the past carried out hacks on seemingly arbitrary online targets.

The group also recently threatened to take down Google but instead defaced the Web site of Add Google Online, a small Indian firm that offersSEO services.

Experts say the kind of attacks CCA carries out shows that the group has limited technical skills.

“We believe they gained access to vulnerable sites using elementary hacking methods and stumbled upon databases or spreadsheets with information they felt would appear threatening if released,” Raijin Rising, a pseudonymous member of the independent counterterrorism network Ghost Security Group, told Newsweek.

“Their activities shine a light on just how vulnerable websites are out there,” the member said. “It’s amazing how bad it is. I would estimate between 50 percent and 75 percent of websites are weak and vulnerable to simple attacks like these.”

I-HLS: http://bit.ly/1WtyQgL

« Now Ambulances Are Vulnerable To Hackers
Cybercrime Is Changing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Allgress

Allgress

Allgress solutions converge disparate risk silos across enterprise networks and automate governance, risk and compliance management processes.

DNV

DNV

DNV are the independent expert in assurance and risk management. We deliver world-renowned testing, certification and technical advisory services.

Arthur J Gallagher & Co

Arthur J Gallagher & Co

Arthur J. Gallagher & Co. is a global insurance brokerage and risk management services firm. Services include Cyber Liability insurance.

National Cyber Summit (NCS)

National Cyber Summit (NCS)

The National Cyber Summit is the preeminent event for cyber training, education and workforce development aimed at protecting our nation's infrastructure from the ever-evolving cyber threat.

Irdeto

Irdeto

Irdeto is the world leader in digital platform security, protecting platforms and applications for media & entertainment, gaming, connected transport and IoT connected industries.

Sectigo

Sectigo

Sectigo is a leading cybersecurity provider of digital identity solutions, including TLS / SSL certificates, DevOps, IoT, and enterprise-grade PKI management, as well as multi-layered web security.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

FraudScope

FraudScope

FraudScope is an AI-assisted platform that accelerates the identification of fraud, waste, and abuse.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

Soliton

Soliton

Soliton is a leading Japanese technology company and a pioneer in IT security solutions for protecting company resources and data from external IT security threats.

EtherAuthority

EtherAuthority

EtherAuthority's engineering team has been helping blockchain businesses to secure their smart contract based assets since 2018.

CloudWave

CloudWave

CloudWave, the expert in healthcare data security, provides cloud, cybersecurity, and managed services to healthcare organizations.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.

Neeve

Neeve

Neeve is an edge cloud platform transforming smart buildings and spaces, making them more secure, smarter, and more sustainable.