ISIS fanatics allegedly leaked email addresses and passwords online accesss in plain text form by 1.500 US military and CIA personnel.
Leakage includes full names, email addresses, encrypted passwords, postcodes, workspaces, and phone numbers.
The ISIS "Islamic State Hacking Division" group claimed responsibility for the alleged Twitter leak, and their account was deleted shortly afterwards.
The records include details of allegedly State Department employees, and US Navy, Army, Air Force and NASA staff. There is also a mix of US embassy executives, the Department of Energy, few US Post Office workers, patent office staff, and many others.
But something is wrong on ISIS leaked list. There are many listings for people with non-US addresses - such as an Israeli lawyer (court.gov.il), someone from a college in Mississippi (millsaps.edu), someone from the Australian National Audit Office (anao. gov.au), and an employee from the UK Council (stockport.gov.uk).
It looks like someone has collected "gov" or "mil" email addresses from all over the internet.
And the passwords that were leaked seem to be hilariously weak – like “david8”. That is, codes that no one would ever expect a government agency to accept.
We randomly selected and named the number of people on the list. In some cases, they worked but no one got, while in others the numbers were disconnected.
So it is not clear where the information is coming from. They could even have been acquired from attacks Phishing on private social accounts.
"As you continue your attacks on the Islamic State with bombings against Muslims, you should know that we know and are on your e-mail and electronic systems. computers your. We see and record your every move, we have your names and addresses, we're on your e-mail and the social media accounts you use.”
A representative of the Pentagon told the Register that they knew about the alleged leak.
"We can not confirm its credibility at this time. The safety of the members of our service is always our primary concern ", he added.