The Largest Security-Cleared Career Network for Defense and Intelligence Jobs - JOIN NOW

Homeland Security

Iran Press TV

US military data stolen by Daesh's ‘Hacking Division’

Iran Press TV

Aug 13, 2015 2:17PM

A so-called “hacking division” of the Daesh Takfiri group has released names, home addresses and other sensitive details of hundreds of US military and embassy staff in an alleged “hit list.”

The Takfiri terrorist group claimed on Tuesday that its hackers have infiltrated computers belonging to the American military and accessed data such as photographs, phone numbers, addresses and even credit card details of some 1500 US Army, Navy and State Department staff.

The group has also called on its “brothers in America” to carry out lone wolf attacks against those mentioned on the lists.

The lists were released on a Twitter account that is affiliated with Abu Hussain al-Britani (Junaid Hussain), a British national who is suspected of leading a team of hackers that carries out cyber attacks for the ISIL.

"They have us on their 'hit list', and we have them on ours too...," he said in one of his Tweets.

Al-Britani, 21, is believed to be the third person on the Pentagon’s kill list of key ISIL figures, only preceded by Jihadi John and the group’s leader, Abu Bakr al-Baghdadi.

The Pentagon confirmed on Wednesday that it is investigating the matter but downplayed the claims made by the Daesh, saying that the data is retrieved from social media and other public sources.

This is the second time the Daesh is making claims about using cyber warfare against Washington. Last March, the terrorist group released another batch of “hacked” personal details concerning 100 US military members.

At the time, a spokesperson for the US Marine Corps said in a statement that the Navy and Marine personnel affected by the purported attack are being notified by the Naval Criminal Investigative Service (NCIS).

"It is recommended Marines and family members check their online/social footprint, ensuring privacy settings are adjusted to limit the amount of available personnel information," the statement added.

The latest batch, however, is suspected by some analysts of presenting fake information as some of the leaked passwords are too weak and do not qualify for military use. Some of the phone numbers are also out of service, according to the Register.

The ISIL terrorists have been widely using internet and various social media networks to spread propaganda and recruit Westerners.



NEWSLETTER
Join the GlobalSecurity.org mailing list