Categories: Breaking NewsHacking

#OpISIS Anonymous published a list of 70 pro ISIS websites

A group of hackers linked to Anonymous published a list of websites alleged supporting propaganda activities of the Islamic State (ISIS).

In the last weeks, hacktivists linked to the Anonymous collective declared war to members of the ISIS and announced a large-scale campaign against the websites used by the terrorists for propaganda.

According to The New York Times hackers are targeting accounts used by ISIS members for propaganda and recruit new sympathizers. A group of hackers using the pseudonyms of TouchMyTweets, The Doctor and IS Hunting are targeting suspected ISIS accounts blacklisting them, the hackers have also launched a call to arms for other hackers to report and interfere with any other accounts used by the IS members.

ISISISIS

Now the Anonymous hacktivist group has released a list of websites allegedly supporting the ISIS extremist group. The list includes the websites of hosting providers and companies that offered protection services against cyber attacks. The companies managing the websites are accused to support the ISIS and its activities. The list contains the names of 70 websites and the name of their hosting provider, among them there is also the popular service CloudFlare that provides a content delivery network and distributed domain name server system used to protect customers’ web services.

The list was published by a group named “GhostSec” that operated with other cells to dismantle websites used by the ISIS and expose social media accounts of its members.

The members of GhostSec initially leaked a list of 26,000 Twitter accounts that were allegedly linked to the ISIS.

The list is available at the URL https://ghostbin.com/paste/ce5jz.

Anonymous vs ISISAnonymous vs ISIS

All the websites identified by Anonymous and related social media accounts were used by the ISIS members for propaganda, recruitment and communications.

“All websites listed below are frequently used by the Islamic State through Twitter and other social media platforms for transmission of propaganda, religion, recruitment, communications and intelligence gathering purposes. Next to the URL you will find the company hosting content for that website. Verification can be done by visiting http://check-host.net and entering the website URL. It is our sincerest hope that the media use this as a tool to show the world that the Islamic State is everywhere in some shape or form and that companies are unaware of their customers content or they turn a blind eye for easy profit and choose to accept bloodmoney. CloudFlare is by far the largest offender on this list and they have been made aware of the specified content they are protecting but chose to block us from contacting them rather than addressing the issue. Together we can stop this from spreading and hold these companies accountable for their less than ethical business practices.”

Stay tuned for further information …

Pierluigi Paganini

(Security Affairs –  ISIS,  Anonymous)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Fortinet vulnerability to its Known Exploited Vulnerabilities…

1 hour ago

Kosovo authorities extradited admin of the cybercrime marketplace BlackDB.cc

Kosovar citizen extradited to the US for running the cybercrime marketplace BlackDB.cc appeared in federal…

3 hours ago

U.S. CISA adds Microsoft Windows flaws to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…

14 hours ago

Ivanti fixed two EPMM flaws exploited in limited attacks

Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…

16 hours ago

Microsoft Patch Tuesday security updates for May 2025 fixed 5 actively exploited zero-days

Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…

1 day ago

Fortinet fixed actively exploited FortiVoice zero-day<gwmw style="display:none;"></gwmw><gwmw style="display:none;"></gwmw>

Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…

1 day ago