ISIS' 'Cyber Caliphate' Hacks 50,000+ Twitter Accounts

In a security breach, Islamic State militants have reportedly hacked tens of thousands of Twitter accounts and posted phone numbers of CIA and FBI chiefs online as revenge for killing of a top hacker of the terror group. 

Details of more than 54,000 Twitter accounts, including passwords, were published last week in what experts have described as a dangerous escalation of the global cyberwar. 

The group calling itself 'Cyber Caliphate', set up by ISIS member Junaid Hussain, encouraged its followers to seize control of the accounts and use them to spread Islamic State of Iraq and Syria propaganda, the Daily Express reported. Victims were forced to defenselessly watch as ISIS rhetoric appeared under their names. 

The jihadists also posted personal details on the social media platform -- including mobile phone numbers of the heads of the CIA, FBI and America's National Security Agency (NSA), the report said. Most of those affected are based in Saudi Arabia, but some are feared to be British. 

One victim, a half-British engineer based in Saudi Arabia was quoted as saying, "I am horrified at how they got hold of my details." 

Hussain, from Birmingham, steered the computer hacking division for the terror group before he was killed in August by a US drone carrying out a joint operation with Britain. Since the extremist's death the hacking group -- which briefly hacked a Pentagon Twitter account earlier this year -- appeared to keep a low profile.

The group also taunted the West before tweeting a link to the database of stolen Twitter accounts. "We need years to publish what we have. We will raise our flag in the heart of Europe," the group was quoted as saying…The account was quickly suspended by Twitter.

TimesOfIndia:

« Entrepreneur’s Guide To Surviving A Tech Bubble
Signal: The Snowden-Approved Crypto App Comes to Android »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Visa

Visa

Visa is a global payments technology company that connects consumers, businesses and banks in more than 200 countries and territories worldwide.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

ReliaQuest

ReliaQuest

ReliaQuest’s GreyMatter solution connects existing technology, people, and process – then equips security teams with unified, actionable insights across their entire environment.

Corrata

Corrata

Corrata is an award-winning provider of mobile security and data control solutions for enterprises.

Inavate Consulting

Inavate Consulting

Inavate Consulting are experts in defining and implementing information assurance solutions and governance frameworks. Our ISO27001 consultants are the most experienced in the industry.

Prompt

Prompt

Prompt supports the creation of partnerships and the setting up of industrial-institutional applied R&D projects for all ICT sectors.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Microchip Technology

Microchip Technology

Microchip Technology Inc. is a leading provider of smart, connected and secure embedded control solutions.

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications & Information Protection of Ukraine (SSSCIP)

State Service of Special Communications and Information Protection is the technical security and intelligence service of Ukraine, under the control of the President of Ukraine.

Boxphish

Boxphish

Boxphish provides a proven solution to reduce Human Error and Cyber Human Risk via automated learning journeys and intelligent phishing simulations.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.

BSS

BSS

BSS is a solutions and services business based in the UK with a focus on Cyber Security, Data, Financial Crime, Internal Audit, Change, Risk and Resilience.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.