Categories: HackingSecurity

Skype’s blog and Twitter account compromised by Syrian Electronic Army

The Syrian Electronic Army (SEA) have compromised Skype ‘s Twitter account and blog to protest against the support provided to NSA surveillance programme.

Syrian Electronic Army has conducted first hack of 2014 hitting Skype,  the group of hackers want to remind us that nothing is secure and that netizens will never accept the monitoring of NSA operated in  support of principal IT companies like Microsoft.

SKYPE “Stop Spying” this is the message sent to Microsoft Skype by the popular group of hackers.

Skype Got hacked by the popular group known to have attacked practically every media agency and principal IT companies, the collective is also known for its support to Syrian President Bashar al-Assad.

Syrian Electronic Army also hacked Skype’s Facebook page and the official company blog hosted on Skype’s website.

It is the first time that Syria Electronic Army is acting solely with the intent to protest against privacy violation of the US surveillance programme.

Syria Electronic Army  took control of Skype Twitter account posting the following messages:

“Stop Spying on People! via Syrian Electronic Army,”

“Don’t use Microsoft emails (hotmail, outlook), They are monitoring your accounts and selling it to the governments.”

 

In time I’m writing Skype gained again the access to its accounts and has removed all the messages posted by Syria Electronic Army.

The company also posted its own message to ensure that users’ data wasn’t exposed during the hack.

“You may have noticed our social media properties were targeted today. No user info was compromised. We’re sorry for the inconvenience.”stated the official message of the company.

No doubt that this is the first incident of a long series of attacks that groups of hackers and hacktivists will conduct against IT companies to request to stop the Internet monitoring conducted by governments.

Pierluigi Paganini

(Security Affairs –  Skype, Syria Electronic Army)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Security Affairs newsletter Round 563 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly Security Affairs newsletter has arrived! Every week, the best…

30 minutes ago

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

21 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

22 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

This website uses cookies.