Isis: Hacking U.S. Military Info.
ISIS Group Claims to Have Hacked Information on U.S. Military Personnel
by PHIL HELSEL
A hacker group claiming to be affiliated with the terror organization ISIS on Tuesday posted what it said was the personal information of hundreds of members of the military and government personnel, and urged terrorists to carry out attacks.
Flashpoint Intelligence, a global security firm and NBC News consultant, said it could not authenticate the claim by the so-called "Islamic State Hacking Division" or the accuracy of the information. Islamic State is another name by which ISIS is known.
The Twitter account used has been affiliated with infamous ISIS fighter Abu Hussain Al Britani, Flashpoint said. The account has since been suspended.
The group claimed the information contained names, emails, passwords, and phone numbers of personnel that included individuals from the Air Force, the Marines, NASA and the Port Authority of New York and New Jersey. There is no indication as to how old the information is, or whether the email addresses and passwords are still valid.
"We are aware of the report but cannot confirm credibility at this time," a spokesperson for the Department of Defense said in an email. "The safety of our service members is always a primary concern."
The group had previously claimed it hacked American servers and distributed information on military personnel, but analysts believe that claim was overstated, and the information was instead culled from freely available social media accounts, Flashpoint said.
Pentagon Urges Caution After ISIS Publishes 'Kill List' 2:15
The information released Tuesday also included the purported credit card information of several U.S. State Department officials as well as screenshots of private Facebook messages between purported U.S. servicememebers.
Flashpoint analysts said the "hack" — if true — could be significant as it would represent a growing effort by pro-ISIS groups to distribute personal information that could be used in lone-wolf attacks.