ISIS claims to have violated 54.000 accounts on Twitter

ISIS hackers have infringed tens of thousands of Twitter accounts, including CIA and FBI members, as revenge for the attack on an unmanned US aircraft that killed a British ISIS extremist in August.

isishackinggroup

Cyber , a hacker group founded by its member ISIS Junaid , called on her supporters and followers to hack Twitter accounts in order to avenge Hussain's death.

As a result, hackers have breached over 54.000 accounts on Twitter. Most of the accounts targeted by the jihadists appear to be from Saudi Arabia although some of them are British.

The extremists not only broke thousands of Twitter accounts but managed to gain access to personal information, including phone numbers and passwords, by the heads of:

  • The Central Intelligence Agency (CIA)
  • The Federal Bureau of Investigation (FBI)
  • United States National Security Service

Hussain was a British hacker who gained a reputation through ISIS in Syria as a leading cyber specialist and as the mindset of the online war of ISIS, a US-led airplane killed him in August.

Hussain's hacker team had stopped working after his death, until he reappeared on Friday, where he posted a link to a database that contained all the details of the broken accounts. THE Cyber ​​Caliphate account on Twitter of course he is now suspended

The incident came just a day after another hack by the group With Attitude (CWA), which she claimed to have gain access to a portal of principles of law containing personal information of those arrested in the US as well as in to share information about terrorist attacks and active shooters.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by Dimitris

Dimitris hates on Mondays .....

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).