Syrian Electronic Army hacked President Obama website and social media

Syrian Electronic Army Targeted President Obama’s website, Twitter and Facebook accounts and email account linked to his non-profit activities.

Once again Syrian Electronic Army, the pro-Assad group claims it has hacked the President Barack Obama’s website, the social media accounts belonging to him on Twitter and Facebook and it violated the email accounts linked to a non-profit offshoot of Obama For America, Organizing For Action. The following image posted by SEA is the proof of the hack of the Obama Campaign email account

The attack started this night when the Syrian Electronic Army redirected visitors to the website of the group of hacktivists ( that displayed an eloquent message:


Hacked by SEA

At the time of writing, the was restored and it no longer redirects users to the website of the Syrian Electronic Army.

Once again I remark that Syrian Electronic Army is a structured and fearsome hacking group pro the Syrian President Bashar al-Assad that conducted numerous high profile attacks against media agencies, government organizations and private companies, the last campaign in order of time hit most Qatar websites.

The SEA mission is to defend the President from the attack of enemies especially based on disinformation campaign promoted by Western governments.

It was just the beginning because the Syrian Electronic Army has also taken over another donation page still present on the site and it has posted fake tweets and updates from Obama’s Facebook Page and Twitter accounts.
All the links that Barack Obama account tweeted it and post it on Facebook was redirected to a video showing the truth about Syria” stated the group to Mashable.

At this moment the links posted on President social media accounts had not been fixed.

The group has published on twitter a message to its follower motivating the attack with following statement:

“Obama doesn’t have any ethical issues with spying on the world, so we took it upon ourself to return the favor. #SEA”

Well, despite the incident hasn’t had serious repercussion it is fundamental to highlight that similar incidents could cause serious problems, let’s remind the effect on stock market observed just after the SEA has hacked months ago the Twitter account of AP.

How is it possible that these guys succeeded so easily to hack official Presidential accounts? IMHO this is very serious, this time they hit a website, next time it could be the SCADA of a critical infrastructure, do not underestimate the incident.

Pierluigi Paganini

(Security Affairs – President Obama,SEA, cyber security)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Experts observed approximately 120 malicious campaigns using the Rafel RAT

Multiple threat actors are using an open-source Android remote administration tool called Rafel RAT to target Android…

1 hour ago

LockBit claims the hack of the US Federal Reserve

The Lockbit ransomware group announced that it had breached the US Federal Reserve and exfiltrated…

4 hours ago

Ransomware threat landscape Jan-Apr 2024: insights and challenges

Between Jan and Apr 2024, the global ransomware landscape witnessed significant activity, with 1420 ransomware…

6 hours ago

ExCobalt Cybercrime group targets Russian organizations in multiple sectors

The cybercrime group ExCobalt targeted Russian organizations in multiple sectors with a previously unknown backdoor…

7 hours ago

Threat actor attempts to sell 30 million customer records allegedly stolen from TEG

A threat actor is offering for sale customer data allegedly stolen from the Australia-based live…

17 hours ago

Security Affairs newsletter Round 477 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago

This website uses cookies.