Categories: Breaking NewsHacking

#OpISIS Anonymous published a list of 70 pro ISIS websites

A group of hackers linked to Anonymous published a list of websites alleged supporting propaganda activities of the Islamic State (ISIS).

In the last weeks, hacktivists linked to the Anonymous collective declared war to members of the ISIS and announced a large-scale campaign against the websites used by the terrorists for propaganda.

According to The New York Times hackers are targeting accounts used by ISIS members for propaganda and recruit new sympathizers. A group of hackers using the pseudonyms of TouchMyTweets, The Doctor and IS Hunting are targeting suspected ISIS accounts blacklisting them, the hackers have also launched a call to arms for other hackers to report and interfere with any other accounts used by the IS members.

Now the Anonymous hacktivist group has released a list of websites allegedly supporting the ISIS extremist group. The list includes the websites of hosting providers and companies that offered protection services against cyber attacks. The companies managing the websites are accused to support the ISIS and its activities. The list contains the names of 70 websites and the name of their hosting provider, among them there is also the popular service CloudFlare that provides a content delivery network and distributed domain name server system used to protect customers’ web services.

The list was published by a group named “GhostSec” that operated with other cells to dismantle websites used by the ISIS and expose social media accounts of its members.

The members of GhostSec initially leaked a list of 26,000 Twitter accounts that were allegedly linked to the ISIS.

The list is available at the URL https://ghostbin.com/paste/ce5jz.

All the websites identified by Anonymous and related social media accounts were used by the ISIS members for propaganda, recruitment and communications.

“All websites listed below are frequently used by the Islamic State through Twitter and other social media platforms for transmission of propaganda, religion, recruitment, communications and intelligence gathering purposes. Next to the URL you will find the company hosting content for that website. Verification can be done by visiting http://check-host.net and entering the website URL. It is our sincerest hope that the media use this as a tool to show the world that the Islamic State is everywhere in some shape or form and that companies are unaware of their customers content or they turn a blind eye for easy profit and choose to accept bloodmoney. CloudFlare is by far the largest offender on this list and they have been made aware of the specified content they are protecting but chose to block us from contacting them rather than addressing the issue. Together we can stop this from spreading and hold these companies accountable for their less than ethical business practices.”

Stay tuned for further information …

Pierluigi Paganini

(Security Affairs –  ISIS,  Anonymous)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Fintech firm Figure disclosed data breach after employee phishing attack

Fintech firm Figure confirmed a data breach after hackers used social engineering to trick an…

18 hours ago

U.S. CISA adds a flaw in BeyondTrust RS and PRA to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw in BeyondTrust RS and…

19 hours ago

Suspected Russian hackers deploy CANFAIL malware against Ukraine

A new alleged Russia-linked APT group targeted Ukrainian defense, government, and energy groups, with CANFAIL…

1 day ago

New threat actor UAT-9921 deploys VoidLink against enterprise sectors

A new threat actor, UAT-9921, uses the modular VoidLink framework to target technology and financial…

2 days ago

Attackers exploit BeyondTrust CVE-2026-1731 within hours of PoC release

Attackers quickly targeted BeyondTrust flaw CVE-2026-1731 after a PoC was released, enabling unauthenticated remote code…

2 days ago

Google: state-backed hackers exploit Gemini AI for cyber recon and attacks

Google says nation-state actors used Gemini AI for reconnaissance and attack support in cyber operations.…

2 days ago

This website uses cookies.