Categories: Cyber CrimeHacking

Anonymous supports FBI investigation of US CENTCOM hack

FBI seems to consider seriously the list of IP addresses involved in the hack of US CENTCOM social media accounts and provided by members of Anonymous.

The FBI is investigating on IP addresses released by the Anonymous collective in a wake of the hijacking of the US CENTCOM social media accounts. Anonymous members have collected the IP addresses of the alleged hackers who breached the accounts. Members of Anonymous operating from TheAnonMessage Twitter account, informed the FBI that they were in possess of the IP addresses of the alleged attackers.

While Anonymous started the #OpCharlieHebdo campaign against jihadist websites to avenge the attack against the Charlie Hebdo, hackers of the CyberCaliphate group, claiming to support the terrorist group ISIS, have compromised the official Twitter account for the U.S. Central Command (US CENTCOM).

The responsible for the CENTCOM account hijacking claimed to have compromised officials’ mobile devices and as proof of the hack disclosed a series of images and documents. Further investigation allowed the experts to verify that the documents disclosed were already publicly available.

The US Army confirmed that hackers have had access only to social media account by that haven’t had access to internal system neither have used the accounts to spread malicious code or to conduct other malicious activities.

“CENTCOM’s operational military networks were not compromised and there was no operational impact to U.S. Central Command. CENTCOM will restore service to its Twitter and YouTube accounts as quickly as possible. We are viewing this purely as a case of cyber vandalism,” reads the statement issued by the CENTCOM.

The US CENTCOM confirmed that classified information was not disclosed and that law enforcement are investigating on the incident.

“In the meantime, our initial assessment is that no classified information was posted and that none of the information posted came from CENTCOM’s server or social media sites. Additionally, we are notifying appropriate DoD and law enforcement authorities about the potential release of personally identifiable information and will take appropriate steps to ensure any individuals potentially affected are notified as quickly as possible.” continues the statement.

Anonymous has shared information on the attackers through the Twitter account @TheAnonMessage.

“We’re scanning to see if any proxies were used but we’re certain the source is from Maryland.” states one of the tweets.

On Friday, a memo from the FBI forwarded the IP address information to several security experts, the document includes data provided by Anonymous. The intent of the FBI is to verify is to verify the reliability of the information with the help of the data that is in possession of the experts.

“On 12 January 2015, at 2:01PM CST, @TheAnonMessage, a Twitter account associated with the Anonymous hacking group, tweeted 11 IP addresses involved with the CENTCOM hack with the message,” reads the memo explains. “The FBI is providing a list of IPs obtained from @TheAnonMessage Twitter Account, and encourages recipients to examine their networks for any activity related to these IP addresses.”

There is also another strange circumstance that occurred just after the release of a list of IP addresses, it seems that the alleged responsible for the CENTCOM incident also took control of the @TheAnonMessage twitter account, that was any way recovered by Anonymous in a short period.

The IP addresses are:

70.91.70.0
70.91.157.0
71.200.69.0
71.200.81.0
67.162.234.0
66.53.34.0
76.111.139.0
76.111.153.0
75.150.31.0
75.145.8.0
72.84.185.0

Stays Tuned for further information ….

 

[adrotate banner=”9″] [adrotate banner=”12″]

Pierluigi Paganini

(Security Affairs –  Anonymous, US CENTCOM)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Google: China dominates government exploitation of zero-day vulnerabilities in 2023

Google's Threat Analysis Group (TAG) and Mandiant reported a surge in the number of actively…

16 mins ago

Google addressed 2 Chrome zero-days demonstrated at Pwn2Own 2024

Google addressed two zero-day vulnerabilities in the Chrome web browser that have been demonstrated during…

12 hours ago

INC Ransom stole 3TB of data from the National Health Service (NHS) of Scotland

The INC Ransom extortion group hacked the National Health Service (NHS) of Scotland and is threatening…

16 hours ago

CISA adds Microsoft SharePoint bug disclosed at Pwn2Own to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Microsoft SharePoint vulnerability disclosed at the…

21 hours ago

The DDR Advantage: Real-Time Data Defense

This is the advantage of Data Detection and Response (DDR) for organizations aiming to build…

1 day ago

Finnish police linked APT31 to the 2021 parliament attack

The Finnish Police attributed the attack against the parliament that occurred in March 2021 to…

1 day ago

This website uses cookies.