ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

In a security breach, Islamic State militants have reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online as revenge for killing of a top hacker of the terror group. 

Details of more than 54,000 Twitter accounts, including passwords, were published last week in what experts have described as a dangerous escalation of the global cyberwar. 

The group calling itself 'Cyber Caliphate', set up by ISIS member Junaid Hussain, encouraged its followers to seize control of the accounts and use them to spread Islamic State of Iraq and Syria propaganda, the Daily Express reported. Victims were forced to defenselessly watch as ISIS rhetoric appeared under their names. 

The jihadists also posted personal details on the social media platform -- including mobile phone numbers of the heads of the CIA, FBI and America's National Security Agency (NSA), the report said. Most of those affected are based in Saudi Arabia, but some are feared to be British. 

One victim, a half-British engineer based in Saudi Arabia was quoted as saying, "I am horrified at how they got hold of my details." 

Hussain, from Birmingham, steered the computer hacking division for the terror group before he was killed in August by a US drone carrying out a joint operation with Britain. Since the extremist's death the hacking group -- which briefly hacked a Pentagon Twitter account earlier this year -- appeared to keep a low profile.

The group also taunted the West before tweeting a link to the database of stolen Twitter accounts. "We need years to publish what we have. We will raise our flag in the heart of Europe," the group was quoted as saying…The account was quickly suspended by Twitter.

TimesOfIndia:

« Entrepreneur’s Guide To Surviving A Tech Bubble
Signal: The Snowden-Approved Crypto App Comes to Android »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Berkman Klein Center for Internet & Society

Berkman Klein Center for Internet & Society

The Berkman Klein Center for Internet & Society is a research center at Harvard University that focuses on the study of cyberspace.

Arcitura Education

Arcitura Education

Arcitura is a leading global provider of progressive, vendor-neutral IT training and certification programs.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Innotec Security

Innotec Security

Innotec Security is a Spanish company specializing in cybersecurity-as-a-service, cyber resilience and cyber risk management.

Secret Double Octopus

Secret Double Octopus

Secret Double Octopus offers the world’s only keyless multi-shield authentication technology for users and things.

Precise Biometrics

Precise Biometrics

Precise Biometrics develop and sell fingerprint software for convenient and secure authentication of people’s identity in mobile devices, smart cards and other products with fingerprint sensors.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

R-Tech

R-Tech

R-Tech GmbH manages the digital start-up initiative, whose goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

Node4

Node4

Node4 provide advanced, cloud-led digital transformation solutions, delivered with technical expertise, innovation and exceptional service to drive your business forwards.

RMRF Tech

RMRF Tech

RMRF is a team of cybersecurity engineers and penetration testers which specializes in the development of solutions for early cyber threat detection and prevention.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Open Web Application Security Project (OWASP)

Open Web Application Security Project (OWASP)

The Open Web Application Security Project (OWASP) is a nonprofit foundation that works to improve the security of software.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

Oduma Solutions

Oduma Solutions

Oduma Solutions is a wholly owned Ghanaian Cybersecurity company that offers information security services to organisations seeking to improve their security posture.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.