Categories: Cyber CrimeHacking

Anonymous supports FBI investigation of US CENTCOM hack

FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM social media accounts and provided by members of Anonymous.

The FBI is investigating on IP addresses released by the Anonymous collective in a wake of the hijacking of the US CENTCOM social media accounts. Anonymous members have collected the IP addresses of the alleged hackers who breached the accounts. Members of Anonymous operating from TheAnonMessage Twitter account, informed the FBI that they were in possess of the IP addresses of the alleged attackers.

Anonymous message US CENTCOMAnonymous message US CENTCOM

While Anonymous started the #OpCharlieHebdo campaign against jihadist websites to avenge the attack against the Charlie Hebdo, hackers of the CyberCaliphate group, claiming to support the terrorist group ISIS, have compromised the official Twitter account for the U.S. Central Command (US CENTCOM).

The responsible for the CENTCOM account hijacking claimed to have compromised officials’ mobile devices and as proof of the hack disclosed a series of images and documents. Further investigation allowed the experts to verify that the documents disclosed were already publicly available.

The US Army confirmed that hackers have had access only to social media account by that haven’t had access to internal system neither have used the accounts to spread malicious code or to conduct other malicious activities.

“CENTCOM’s operational military networks were not compromised and there was no operational impact to U.S. Central Command. CENTCOM will restore service to its Twitter and YouTube accounts as quickly as possible. We are viewing this purely as a case of cyber vandalism,” reads the statement issued by the CENTCOM.

The US CENTCOM confirmed that classified information was not disclosed and that law enforcement are investigating on the incident.

“In the meantime, our initial assessment is that no classified information was posted and that none of the information posted came from CENTCOM’s server or social media sites. Additionally, we are notifying appropriate DoD and law enforcement authorities about the potential release of personally identifiable information and will take appropriate steps to ensure any individuals potentially affected are notified as quickly as possible.” continues the statement.

Anonymous has shared information on the attackers through the Twitter account @TheAnonMessage.

“We’re scanning to see if any proxies were used but we’re certain the source is from Maryland.” states one of the tweets.

On Friday, a memo from the FBI forwarded the IP address information to several security experts, the document includes data provided by Anonymous. The intent of the FBI is to verify is to verify the reliability of the information with the help of the data that is in possession of the experts.

“On 12 January 2015, at 2:01PM CST, @TheAnonMessage, a Twitter account associated with the Anonymous hacking group, tweeted 11 IP addresses involved with the CENTCOM hack with the message,” reads the memo explains. “The FBI is providing a list of IPs obtained from @TheAnonMessage Twitter Account, and encourages recipients to examine their networks for any activity related to these IP addresses.”

There is also another strange circumstance that occurred just after the release of a list of IP addresses, it seems that the alleged responsible for the CENTCOM incident also took control of the @TheAnonMessage twitter account, that was any way recovered by Anonymous in a short period.

The IP addresses are:

70.91.70.0
70.91.157.0
71.200.69.0
71.200.81.0
67.162.234.0
66.53.34.0
76.111.139.0
76.111.153.0
75.150.31.0
75.145.8.0
72.84.185.0

Stays Tuned for further information ….

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  Anonymous, US CENTCOM)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

US Government officials targeted with texts and AI-generated deepfake voice messages impersonating senior U.S. officials

FBI warns ex-officials are targeted with deepfake texts and AI voice messages impersonating senior U.S.…

6 hours ago

Shields up US retailers. Scattered Spider threat actors can target them

Google warns that the cybercrime group Scattered Spider behind UK retailer attacks is now targeting…

9 hours ago

U.S. CISA adds Google Chromium, DrayTek routers, and SAP NetWeaver flaws to its Known Exploited Vulnerabilities catalog<gwmw style="display:none;"></gwmw>

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chromium, DrayTek routers, and SAP NetWeaver…

15 hours ago

Pwn2Own Berlin 2025 Day Two: researcher earned 150K hacking VMware ESXi

On day two of Pwn2Own Berlin 2025, participants earned $435,000 for demonstrating zero-day in SharePoint,…

1 day ago

New botnet HTTPBot targets gaming and tech industries with surgical attacks

New botnet HTTPBot is targeting China's gaming, tech, and education sectors, cybersecurity researchers warn. NSFOCUS …

1 day ago

Meta plans to train AI on EU user data from May 27 without consent

Meta plans to train AI on EU user data from May 27 without consent; privacy…

2 days ago