ISIS hackers violated top secret British Government emails

According to an investigation by the GCHQ intelligence agency ISIS hackers targeted information held by some of David Cameron’s most senior ministers.

According the experts at the British Intelligence GCHQ, ISIS hackers intercept top secret British Government emails.

The investigation conducted by the GCHQ allowed the British intelligence to uncover a serious breach, terrorists linked to the ISIS have been targeting email accounts held by some of David Cameron’s most senior ministers, including the Home Secretary Theresa May.

The hack could have exposed confidential information related to the British Government and members of the Royal family, at the Time I’m writing there aren’s information related to the data accessed by the ISIS hackers.

“It is understood that at least one of the plot’s ringleaders was killed by a drone strike in an operation disclosed by the Prime Minister this week.” reported the Mirror.

The news doesn’t surprise media, Government entities, politicians and military organizations are privileged targets for the ISIS sympathizers that use the web for intelligence gathering on potential targets. In May Pro-Isis Hackers belonging to Cyber Caliphate hacking team threaten ‘Electronic War’ on US and Europe.

In May, GCHQ warned Whitehall security officials about ISIS plans to attack British targets.

Although no security breach occurred to the Government email systems, officials were told to tighten security procedures.

The Mirror makes explicit reference to the “changing passwords,” not referring the adoption of further defense mechanisms to protect the email accounts, such as two-factor authentication.

Unfortunately, the ISIS is continuing ti develop its cyber capabilities, in the past they demonstrated a mastery of technology for both propaganda and hacking purposes. In June, ISIS supporters were spreading online a collection of tutorial titled the Book of Terror to teach how Hack a Wi-FI network and which are main spying tools.

Among the group of hackers that claim to be affiliated with the ISIS there is a collective of hackers calling themselves the “Islamic State’s Defenders in the Internet,” also known as Cyber Caliphate. The group, which was involved in the hijacking of social media accounts belonging to the US CENTCOM, released a propaganda video threatening cyber attacks anticipating the operation of the terrorists in the Internet.

At the end of August, one of the most popular ISIS hackers, Junaid Hussain, was killed in a US targeted air strike in Syria. The hacker was actively recruiting ISIS sympathizers and according to the British intelligence he directed a plot to kill the Queen.

Pierluigi Paganini

(Security Affairs – ISIS , hacking)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Ex-NSA employee sentenced to 262 months in prison for attempting to transfer classified documents to Russia

A former U.S. NSA employee has been sentenced to nearly 22 years in prison for…

3 hours ago

Cuttlefish malware targets enterprise-grade SOHO routers

A new malware named Cuttlefish targets enterprise-grade and small office/home office (SOHO) routers to harvest…

4 hours ago

A flaw in the R programming language could allow code execution

A flaw in the R programming language enables the execution of arbitrary code when parsing…

6 hours ago

Muddling Meerkat, a mysterious DNS Operation involving China’s Great Firewall

The China-linked threat actors Muddling Meerkat are manipulating DNS to probe networks globally since 2019.…

13 hours ago

Notorious Finnish Hacker sentenced to more than six years in prison

Finnish hacker was sentenced to more than six years in prison for hacking into an…

24 hours ago

CISA guidelines to protect critical infrastructure against AI-based threats

The US government’s cybersecurity agency CISA published a series of guidelines to protect critical infrastructure…

1 day ago

This website uses cookies.