ISIS hackers, was subject to e-mail from the British government

The GCHQ of the United Kingdom (Government Communications Headquarters) has revealed that hackers linked to the ISIS terrorist group managed to intercept sensitive emails exchanged by British cabinet ministers, according to a Mirror publication.isis

Σύμφωνα με πηγές μέσα από το GCHQ, το δεν παραβιάστηκε πλήρως, αλλά οι hackers ήταν σε θέση να έχουν πρόσβαση και να διαβάσουν μηνύματα ηλεκτρονικού ταχυδρομείου που ανταλλάσσονταν.

Officials have confirmed as a sure victim only Theresa May, the Home Secretary, but as other senior ministers from the David Cameron government seem to be being watched by terrorists.

GCHQ reported that the information leaked was related to events attended by government officials and members of the royal family.

Earlier this week, forces from the United Kingdom killed a British jihadist in Syria when the κατασκοπείας της χώρας ανακάλυψαν ότι προσπαθούσε να σκοτώσει τη βασίλισσα. Λέγεται ότι, τα δύο αυτά γεγονότα συνδέονται, και οι jihadιστές ήταν σε θέση να προγραμματίσουν τις them, using the information they obtained from the hack.

According to the Daily Mail, this was the first time a ISIS cyber attack on British officials. All previous attacks were usually targeted at the US and French governments.

Στα τέλη του Αυγούστου, Αμερικανικές δυνάμεις σκότωσαν τον Junaid Hussain, που ήταν ο ηγέτης του Division, of the Islamic State with an attack by an unmanned aircraft.

However, while the Islamic State does not seem to have the same military capabilities as Western countries, their presence on the internet is strong enough.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).