• Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
MUST READ

200 Swedish municipalities impacted by a major cyberattack on IT provider

 | 

TransUnion discloses a data breach impacting over 4.4 million customers

 | 

NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs

 | 

UNC6395 targets Salesloft in Drift OAuth token theft campaign

 | 

Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

 | 

U.S. CISA adds Citrix NetScaler flaw to its Known Exploited Vulnerabilities catalog

 | 

Healthcare Services Group discloses 2024 data breach that impacted 624,496 people

 | 

ESET warns of PromptLock, the first AI-driven ransomware

 | 

China linked UNC6384 targeted diplomats by hijacking web traffic

 | 

Farmers Insurance discloses a data breach impacting 1.1M customers

 | 

Citrix fixed three NetScaler flaws, one of them actively exploited in the wild

 | 

Auchan discloses data breach: data of hundreds of thousands of customers exposed

 | 

U.S. CISA adds Citrix Session Recording, and Git flaws to its Known Exploited Vulnerabilities catalog

 | 

Docker fixes critical Desktop flaw allowing container escapes

 | 

Malicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware

 | 

Pakistan-linked APT36 abuses Linux .desktop files to drop custom malware in new campaign

 | 

Android.Backdoor.916.origin malware targets Russian business executives

 | 

Electronics manufacturer Data I/O took offline operational systems following a ransomware attack

 | 

IoT under siege: The return of the Mirai-based Gayfemboy Botnet

 | 

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 59

 | 
  • Home
  • Cyber Crime
  • Cyber warfare
  • APT
  • Data Breach
  • Deep Web
  • Digital ID
  • Hacking
  • Hacktivism
  • Intelligence
  • Internet of Things
  • Laws and regulations
  • Malware
  • Mobile
  • Reports
  • Security
  • Social Networks
  • Terrorism
  • ICS-SCADA
  • POLICIES
  • Contact me
  • Home
  • Breaking News
  • Hacking
  • Hacktivism
  • Terrorism
  • Hacker Interviews – WauchulaGhost, a Ghost that hacks for our children

Hacker Interviews – WauchulaGhost, a Ghost that hacks for our children

Pierluigi Paganini July 16, 2016

Enjoy the interview with WauchulaGhost (@wauchulaghost), one of the most active hackers in the fight against the IS online.

Military, law enforcement, and hackers have the same the same goal, disrupt the propaganda activities managed by the Islamic State and interfere with IS daily functions, like paying its fighters.

There is a silent cyber army of volunteers that every day hunts IS members online, WauchulaGhost is one of these silent warriors.

Recently he took over a large number of Twitter accounts belonging to the IS replacing the profile pictures of the hacked IS Twitter accounts with porn pictures displaying text like ‘I Love Porn.’

The vast majority of Twitter accounts targeted by the hackers were from Saudi Arabia, Iraq, and Syria.

I don’t want to tell you more … enjoy the interview with WauchulaGhost:

WauchulaGhost

Hi WauchulaGhost, first of all, thank you. You are one of the hackers that every day silently fights to destroy IS activities online, could you tell me which his your technical background and when you started hacking?

I would say it started years ago when I first purchased a computer. I knew a little about them and had always been curious as to how they worked. After purchasing I took it home and disassembled it completely. Of course, it didn’t work when I reassembled it.

Needless to say, it went back. The tech looked at it, then looked at me and invited me back into his lab. A week later I was building and programming PC’s and learning as I went. I enjoyed it so it’s something I kept going with eventually building websites for companies and now I run multiple networks, Email servers, Online payment systems etc. At night I become the Ghost. People ask why? I can only say to the people, for the future of this world, our children. The world today is a very sad place and seems to be getting worse. If we can improve things, change things or even save lives, then we have succeeded. In the past year, we have done that. While in my former group, we assisted in preventing a Terrorist attack. 17 people were arrested. We just want to make the world a little better. Islamic State has become a nightmare for the world and I will do what I can to slow their progress.

What was your greatest hacking challenge?

Not getting caught would be #1. Not all hackers will identify their challenges and for good reasons. The best hackers are the ones who never brag about what they have done. Bragging will only get you caught. I’m pretty quiet about what I do, how I do it and what tools I use. Again, I’m not like most. I tend to stay to myself. Even in public. I pretty much work, then go straight home. I hate loud, busy places. My preference is a quiet dark place, the Ghost Den 😉 But I will say password cracking was a challenge. Not using software, but SE’ing. I had a fellow employee that wasn’t really into tech stuff ask me about passwords. So I started talking to him. Asking questions and giving advice. After about 20 minutes I wrote down 5 passwords and asked him if any of those belonged to his Facebook account. He sat down at his terminal and changed his password. Complex people….Think Complex!!

Do you think that IS militant are exploiting Dark Nets and other covert channels for communication? Which ones?

Somewhat. I know they had and still have onion sites. As far as communication it’s mostly chat apps. The largest right now is Telegram. I have jacked hundreds of ISIS accounts. I’ve communicated with them via those accounts. And a few have requested not to talk on twitter and sent me links to their chat groups. But these days those chats don’t last long. The problem with ISIS going dark is they like the attention on the surface too much. Going dark would be no fun for them. Which are the most interesting hacking communities on the web today? I would have to say Twitter and

Which are the most interesting hacking communities on the web today?

I would have to say Twitter and Fedbook (Facebook). There are a large variety of hackers there. Then you have those that only communicate via secured chat like jabber.

Personally, I’m not in big into groups or large communities. I tend to stay alone. Although you wouldn’t expect that by looking at my twitter account.

Do you believe that the IS represents a serious threat to critical infrastructure worldwide? Why?

IS in general, No, I don’t see them as a threat to infrastructure.

However, there are people around the world that support them and have the knowledge and ability to do some damage if they put their heads together. Right now they are using social media to spread their propaganda and fear, which they were doing rather well. It’s been our goal to slow this process down. If you take the fear away, they are nothing. Same goes with the news.

If Major media would stop publishing “What ISIS has done” (Attacks, deaths, etc.) and focus more on what’s being done Against them you would see a major change. Sort of like Serial Killers, They love seeing their work on the News.

We often hear about cyber weapons and cyber attacks against critical infrastructure. Do you believe it is real the risk of a major and lethal cyber attack against a critical infrastructure?

Yes and No. Does Islamic State have that capability? No, but as stated above, there are people (Hackers) that do support them and do have the capability.

The response was yes. So Yes, there is the possibility that foreign hacking groups with US-based hackers could possibly find vulnerabilities in our infrastructure.

Based on your experience, which is the technical background of IS militant online? Most of them that I have talked to and went up against have basic knowledge, for the most part they aren’t that Tech Savvy. 😉

In closing, I would like to say this to all those wanting to help with this fight.

PLEASE think about your safety online first. OpSec-Operational Security is your Priority. Make sure you are secure online. 2 of the biggest things are VPN’s and the use of Tor browser. The last thing I want is an innocent person being exposed to these Psycho’s .

So please make #OpSec #1. And if you have a family, Spend time with them. Do Not let this consume you

[adrotate banner=”9″]

Pierluigi Paganini

(Security Affairs – WauchulaGhost, hacking)


facebook linkedin twitter

Hacking ISIS WauchulaGhost

you might also like

Pierluigi Paganini August 28, 2025
200 Swedish municipalities impacted by a major cyberattack on IT provider
Read more
Pierluigi Paganini August 28, 2025
TransUnion discloses a data breach impacting over 4.4 million customers
Read more

leave a comment

newsletter

Subscribe to my email list and stay
up-to-date!

    recent articles

    200 Swedish municipalities impacted by a major cyberattack on IT provider

    Security / August 28, 2025

    TransUnion discloses a data breach impacting over 4.4 million customers

    Data Breach / August 28, 2025

    NSA, NCSC, and allies detailed TTPs associated with Chinese APT actors targeting critical infrastructure Orgs

    Intelligence / August 28, 2025

    UNC6395 targets Salesloft in Drift OAuth token theft campaign

    Hacking / August 28, 2025

    Over 28,000 Citrix instances remain exposed to critical RCE flaw CVE-2025-7775

    Hacking / August 27, 2025

    To contact me write an email to:

    Pierluigi Paganini :
    pierluigi.paganini@securityaffairs.co

    LEARN MORE

    QUICK LINKS

    • Home
    • Cyber Crime
    • Cyber warfare
    • APT
    • Data Breach
    • Deep Web
    • Digital ID
    • Hacking
    • Hacktivism
    • Intelligence
    • Internet of Things
    • Laws and regulations
    • Malware
    • Mobile
    • Reports
    • Security
    • Social Networks
    • Terrorism
    • ICS-SCADA
    • POLICIES
    • Contact me

    Copyright@securityaffairs 2024

    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
    Cookie SettingsAccept All
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities...
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
    Non-necessary
    Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
    SAVE & ACCEPT