Follow Cyber Kendra on Google News! | WhatsApp | Telegram

Add as a preferred source on Google

Syrian Electronic Army Hacked The True Caller Database

Syrian Electronic Army Hacked The True Caller Database, True caller got hacked, hacked by Syrian Electronic army, true caller hacked, Syrian Electronic Army Hacks Global Phone Directory Truecaller,Truecaller Database hacked by Syrian Electronic Army
Once again Syrian Electronic Army back on the news. After hacking the major organisation twitter accounts there was no news for hacking from SEA. But now the hackers of SEA have breached the security of the the world’s largest collaborative phone directory "True Caller"

As on there twitter accounts they wrote
“Sorry @Truecaller, we needed your database, thank you for it,” the hackers wrote on Twitter.
 As per the post of EHN, it is being stated that hackers have breached the True Caller security by exploiting a vulnerability in the company’s outdated WordPress site.
Hackers have stolen data from the 7 database, including the main data base which is of size 450 GB.  The stolen data contains over 1 million Facebook, Twitter, LinkedIn and Gmail accounts.

True caller have not notified any kind of the announcement for this incident, but they have shut the website down, with the message, "We are doing some upgrades. Thank you for your patience."

Post a Comment

const config = { safeID = 'safelink', safeURL: ['/p/safelink.html'], timer: 15, redirect: true, text: { wait: 'The link will appear in 0 second', direct: 'You’ll be redirected to the download link in 0 second', shifted: 'Redirecting... [link] if you’re not redirected automatically.', click: 'Click here', btn: 'Direct to link.' } }; (() => { const randomURL = url => url[Math.floor(Math.random() * url.length)]; const safeLink = () => config.safeURL.some(path => location.pathname.endsWith(path)); const safeMessage = (text, time) => { const [start, end] = text.split('0'); return `

${start} ${time} ${end}.

`; }; const outboundLinks = () => { const links = document.querySelectorAll('a.safeurl[href]'); if (!links.length) return; links.forEach(anchor => { const encoded = encodeURIComponent(btoa(anchor.href)); Object.assign(anchor, { href: `${location.origin}${randomURL(config.safeURL)}?go=${encoded}`, target: '_self', rel: 'noopener' }) }) }; const handleLink = () => { const params = new URLSearchParams(location.search); const encoded = params.get('go'); if (!encoded) return; const link = atob(decodeURIComponent(encoded)) params.delete('go'); history.replaceState({}, '', location.pathname + (params.toString() ? '?' + params : '')); let counter = config.timer; const label = config.redirect ? config.text.direct : config.text.wait; const box = document.getElementById(config.safeID); if (!box) return; box.removeAttribute('hidden'); box.innerHTML = safeMessage(label, counter); const countdown = setInterval(() => { counter--; box.innerHTML = safeMessage(label, counter); if (counter > 0) return; clearInterval(countdown); if (config.redirect) { box.innerHTML = `

${config.text.shifted.replace('[link]', `${config.text.click}`)}

`; location.href = link; } else { box.innerHTML = ''; const btn = document.createElement('a'); //btn.className = 'btn'; btn.href = link; btn.target = '_blank'; btn.rel = 'nofollow noopener noreferrer'; btn.innerHTML = `${config.text.btn}`; box.appendChild(btn); } }, 1000) }; safeLink() ? handleLink() : outboundLinks(); })();