ISIS fanatics allegedly leaked email addresses and passwords online accesss in plain text form by 1.500 US military and CIA personnel.
The leak includes full names, email addresses, unencrypted passwords, zip codes, locations work, as well as phone numbers.
The ISIS "Islamic State Hacking Division" group claimed responsibility for the alleged Twitter leak, and their account was deleted shortly afterwards.
The records include details of allegedly State Department employees, and US Navy, Army, Air Force and NASA staff. There is also a mix of US embassy executives, the Department of Energy, few US Post Office workers, patent office staff, and many others.
But something is wrong on ISIS leaked list. There are many listings for people with non-US addresses - such as an Israeli lawyer (court.gov.il), someone from a college in Mississippi (millsaps.edu), someone from the Australian National Audit Office (anao. gov.au), and an employee from the UK Council (stockport.gov.uk).
It looks like someone has collected "gov" or "mil" email addresses from all over the internet.
And the leaked passwords seem to be hilariously weak – like “david8”. That is, codes that no one would ever expect a cybernetic to accept service.
We randomly selected and named the number of people on the list. In some cases, they worked but no one got, while in others the numbers were disconnected.
So it is not clear where the information is coming from. It could even have been acquired from attacks phishing on private social media accounts.
"As you continue your attacks on the Islamic State with bombings against Muslims, you should know that we know and are in your e-mails and your computer systems. We track and record your every move, we have your names and addresses, we are in your email and the social networking accounts you use. ”
A representative of the Pentagon told the Register that they knew about the alleged leak.
"We can not confirm its credibility at this time. The safety of the members of our service is always our primary concern ", he added.