You can now find Cyber Kendra on Google News | Telegram

GCHQ hacked by Syrian Electronic Army But....

official site of US Army hacked, GCHQ hacked by Syrian Electronic Army, GCHQ site hacked, SEA fequrently pentest US government servers and Networks, talk With SEA hackers, interview of Syrian Electronic Army
After hacking into the official site of US Army (, Pro hackers group Syrian Electronic Army have showed another hack. On the twitter account they posted the image of domain panel of the GCHQ.

Syrian Electronic Army tweets the photo of Limelight control panel of GCHQ domain. Last time also SEA hackers have hacked into the limelight control panel of the US army website and thus deface it. Here once again they have hacked the GCHQ domain control panel.

The Government Communications Headquarters (GCHQ) is a British intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.

After US Army, now SEA targeted US intelligence and security organisation, and on the talk With SEA hackers, [we] Cyber Kendra have reported that SEA fequrently pentest US government servers and Networks. Moreover, they also mentioned that they have a huge amount of data collected from the previous hack.

Unfortunately, in an statement given to Ars by Limelight spokesperson say - "we didn't have any evidence of customer data compromise". But   SEA hackers confirmed to +Cyber Kendra  that they have huge amounts of data containing details about the US army soldiers, officers, generals, etc...  Another think they confirmed that, they also have some important and confidential files and reports. 

UPDATE :- From Syrian Electronic Army
As on the tweet Syrian Electronic Army says "we were too later" by this SEA hackers means to say that, GCHQ DNS was hosted on the Limelight but they moved to another a while ago.

Syrian Electronic Army says to Cyber Kendra that GCHQ was not there target, it was US Army and they achieved it. 

Post a Comment

Cookie Consent
We serve cookies on this site to analyze traffic, remember your preferences, and optimize your experience.
It seems there is something wrong with your internet connection. Please connect to the internet and start browsing again.
AdBlock Detected!
We have detected that you are using adblocking plugin in your browser.
The revenue we earn by the advertisements is used to manage this website, we request you to whitelist our website in your adblocking plugin.
Site is Blocked
Sorry! This site is not available in your country.