ISIS hackers, was subject to e-mail from the British government

Το GCHQ του Ηνωμένου Βασιλείου (Αρχηγείο Κυβερνητικών Επικοινωνιών , ή Government Headquarters) has revealed that hackers linked to the terrorist group ISIS managed to intercept sensitive emails exchanged between British cabinet ministers, according to a Mirror publication.isis

According to sources through GCHQ, the system was not completely violated, but hackers were able to access and read emails that were being exchanged.

Officials have confirmed only Theresa May, the Home Secretary, as a definite victim, but it appears other senior ministers from of David Cameron, was watched by the terrorists.

GCHQ reported that the information leaked was related to events attended by government officials and members of the royal family.

Νωρίτερα αυτή την εβδομάδα, δυνάμεις από το σκότωσαν έναν Βρετανό jihadιστή στη Συρία όταν οι υπηρεσίες κατασκοπείας της χώρας ανακάλυψαν ότι προσπαθούσε να σκοτώσει τη βασίλισσα. Λέγεται ότι, τα δύο αυτά γεγονότα συνδέονται, και οι jihadιστές ήταν σε θέση να προγραμματίσουν τις επιθέσεις τους, χρησιμοποιώντας τις πληροφορίες που απέκτησαν από το hack.

According to the Daily Mail, this was the first time a ISIS cyber attack on British officials. All previous attacks were usually targeted at the US and French governments.

At the end of August, US forces killed Junaid Hussain, who was the leader of the Hacking Division, of the Islamic State with an attack by unmanned aircraft.

Nevertheless, while the Islamic State does not seem to have the same military forces με τις δυτικές χώρες, η παρουσία τους στο it is quite strong.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).