ISIS hackers, was subject to e-mail from the British government

The United Kingdom's GCHQ (Government Communications Headquarters) revealed that linked to the terrorist group ISIS managed to intercept sensitive electronics exchanged by British cabinet ministers, according to a Mirror publication.isis

According to sources through GCHQ, the system was not completely violated, but hackers were able to access and read emails that were being exchanged.

Officials have confirmed as a sure victim only Theresa May, the Home Secretary, but as other senior ministers from the David Cameron government seem to be being watched by terrorists.

GCHQ reported that the information leaked was related to events attended by government officials and members of the royal family.

Earlier this week, forces from the United Kingdom killed a British jihadist in Syria after the country's intelligence services discovered he was trying to kill the queen. It is said that these two events are connected, and the jihadists were able to plan them them, using the information they obtained from the hack.

According to , this was the first time an ISIS cyber attack had been carried out against British officials. All previous attacks usually targeted the US and French governments.

In late August, US forces killed Junaid Hussain, who was its leader Division, of the Islamic State with an attack by an unmanned aircraft.

However, while the Islamic State does not seem to have the same military capabilities as Western countries, their presence on the internet is strong enough.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).