GCHQ hacked by Syrian Electronic Army But....

Share it:
After hacking into the official site of US Army (army.mil), Pro hackers group Syrian Electronic Army have showed another hack. On the twitter account they posted the image of domain panel of the GCHQ.

Syrian Electronic Army tweets the photo of Limelight control panel of GCHQ domain. Last time also SEA hackers have hacked into the limelight control panel of the US army website and thus deface it. Here once again they have hacked the GCHQ domain control panel.

The Government Communications Headquarters (GCHQ) is a British intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

After US Army, now SEA targeted US intelligence and security organisation, and on the talk With SEA hackers, [we] Cyber Kendra have reported that SEA fequrently pentest US government servers and Networks. Moreover, they also mentioned that they have a huge amount of data collected from the previous hack.

Unfortunately, in an statement given to Ars by Limelight spokesperson say - "we didn't have any evidence of customer data compromise". But   SEA hackers confirmed to +Cyber Kendra  that they have huge amounts of data containing details about the US army soldiers, officers, generals, etc...  Another think they confirmed that, they also have some important and confidential files and reports. 

UPDATE :- From Syrian Electronic Army
As on the tweet Syrian Electronic Army says "we were too later" by this SEA hackers means to say that, GCHQ DNS was hosted on the Limelight but they moved to another a while ago.

Syrian Electronic Army says to Cyber Kendra that GCHQ was not there target, it was US Army and they achieved it. 
Share it:

Hacking

News

Security

Syrian Electronic Army

Post A Comment:

0 comments:

Follow by Email