ISIS Hacking Division Takes on Military and Govt Personnel

Alleged ISIS leak compromises hundreds of U.S. military & intelligence emails — Dept of Defense is ‘looking into it’

The top of the page containing the leak appears to show an unconfirmed link to ISIS

Above: The top of the page containing the leak appears to show an unconfirmed link to ISIS

A Twitter account claiming to be the “IS Hacking Division” has published what appears to be an extensive directory of government emails, passwords, credit cards, phone numbers, and addresses spanning U.S. military departments and divisions, the FBI, U.S. embassies, the Library of Congress, U.S. city officials, the British Embassy, the FTC, and NASA, as well as possible personnel at Wells Fargo.

VentureBeat is able to confirm that the U.S. Department of Defense is “looking into” this alleged hack. We’ve also independently verified that at least several of the items included on that list contained accurate information, but that several of the people were not aware that the leak had occurred.

Other details in the document appear inaccurate or outdated; it lists two Intel Corporation email accounts which apparently do not exist in Intel’s “company email directory,” an Intel spokesperson told VentureBeat.

IS hacking division tweet

The content was published onto a site entitled “zonehmirrors.org,” a domain which was registered under the name Redi Alberto in the city of Lugano, Switzerland.

ISIS Group Claims to Have Hacked Information on U.S. Military Personnel
NBC: A hacker group claiming to be affiliated with the terror organization ISIS on Tuesday posted what it said was the personal information of hundreds of members of the military and government personnel, and urged terrorists to carry out attacks.

Flashpoint Intelligence, a global security firm and NBC News consultant, said it could not authenticate the claim by the so-called “Islamic State Hacking Division” or the accuracy of the information. Islamic State is another name by which ISIS is known.
The Twitter account used has been affiliated with infamous ISIS fighter Abu Hussain Al Britani, Flashpoint said. The account has since been suspended.

The group claimed the information contained names, emails, passwords, and phone numbers of personnel that included individuals from the Air Force, the Marines, NASA and the Port Authority of New York and New Jersey. There is no indication as to how old the information is, or whether the email addresses and passwords are still valid.

“We are aware of the report but cannot confirm credibility at this time,” a spokesperson for the Department of Defense said in an email. “The safety of our service members is always a primary concern.”

The group had previously claimed it hacked American servers and distributed information on military personnel, but analysts believe that claim was overstated, and the information was instead culled from freely available social media accounts, Flashpoint said.
T he information released Tuesday also included the purported credit card information of several U.S. State Department officials as well as screenshots of private Facebook messages between purported U.S. servicememebers.

Flashpoint analysts said the “hack” — if true — could be significant as it would represent a growing effort by pro-ISIS groups to distribute personal information that could be used in lone-wolf attacks.

The list of those hacked with names, locations, government divisions, embassies and P/W’s is here.  I was just notified that the original link has been taken offline, after some searching I located this link. http://tu3ek4yox26tber2.onion.nu/   Consider the risk if you choose to open it.

Posted in #StopIran, Citizens Duty, Department of Defense, Department of Homeland Security, DOJ, DC and inside the Beltway, Failed foreign policy, Gangs and Crimes, Insurgency, Iran Israel, ISIS ISIL Islamic State Caliphate, Middle East, Military, NSA Spying, Terror, The Denise Simon Experience, Treasury, Veterans, Whistleblower.

Denise Simon