CENTCOM Under Fire as Pro-ISIS Hackers Seize Twitter, YouTube Accounts

By Steve Anderson January 13, 2015

For anyone who's been on the Internet for any length of time, it's likely that person already knows someone who's had a Twitter, Facebook, or YouTube account hacked. This time, everybody knows someone who's experienced that particular breach of cybersecurity, as well as a YouTube account, thanks to a recent move by pro-ISIS hackers who seized the Twitter feeds and YouTube accounts of the U.S. Central Command (CENTCOM).

The hackers had control of the Twitter account for about 30 minutes, according to reports, before the account was taken down, but in that time, plenty of information went out including pro-ISIS messages (one message reportedly read “i love you isis”) as well as such things as the contact information of retired U.S. Army generals went out. Reportedly, the contact information was in many cases out of date, and none of it was classified, so it was more as if ISIS posted old photos of phone book pages. The YouTube channel, meanwhile, was subsequently hacked and saw two ISIS videos get posted.

Reports suggest the sites recovered quickly—a post on CENTCOM's Twitter feed noted “We're back!” not long after 10 p.m. Eastern, along with a link to a press release—and CENTCOM's YouTube channel appears to be back up and ISIS-free.

As for actual damage caused by this incident, it's really more a matter of a loss of face than anything else. It was once stated by popular science webcomic XKCD that, when the CIA's website is hacked, it's not that someone managed to break into some really spectacularly classified systems, but rather that instead someone managed to break into the most lightly-defended of all CIA operations, because it has the least to offer. Indeed, XKCD specifically compared it to the Web-based equivalent of “tearing down a poster the CIA put up.” Remember, ISIS didn't manage to hack CENTCOM here, but rather successfully guess CENTCOM's Twitter and YouTube passwords. In fact, it wouldn't be out of line to consider the possibility that the two may have been the same password, a practice often decried by security experts but often used by regular people too busy and / or lazy to remember more than one strong password so often prescribed by said experts. This is why so many often recommend the use of some breed of password management tool, and one preferably kept out of the computer's main drag, on something like a USB drive or the like as it allows passwords to be quickly updated and not easily forgotten. It's worth noting that CENTCOM's YouTube page has two videos of ISIL (which is another name for ISIS) warehouses being destroyed from a week ago, and the Twitter / YouTube hack may have been a kind of counter-reprisal.

While this is a kick in the pride for CENTCOM, it's really not much more than that. ISIS managed to pull off a very small, very trivial hack that made CENTCOM look like a bunch of barely computer-literate doofuses for a few hours. It does, however, serve as a bit of a warning for the rest of us, and potentially a nice wake-up call to maybe go and change our email passwords or similar if such hasn't been done recently. The importance of a strong password is hard to understate, and the online razzing that CENTCOM is likely to take over this will serve as a little reminder to the rest of us.




Edited by Maurice Nagle

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

How Valuable is Your Personal Data?

By: Special Guest    9/25/2017

Pressure has been growing in the past few weeks for politicians and regulators to clamp down on the monopoly power of Big Tech. Indeed, scrutiny is gr…

Read More

Designing Insightful Dashboards for Decision Making

By: Special Guest    9/21/2017

As businesses continue to accumulate data that has the potential to improve operations and increase revenue, dashboard design is becoming a key compon…

Read More

Artificial Intelligence: The Human to Bot Handoff

By: Special Guest    9/21/2017

Artificial intelligence (AI) is one of the most talked about and debated topics of conversation happening today. It is touching every industry.

Read More

Dark Data - Do You Have a Plan?

By: Special Guest    9/19/2017

Practically every organization has vast amounts of "dark data" in the form of weblogs, machine logs, and logs from sensors on everything from oil rigs…

Read More

Open is the New Black for Mobile Voice Services

By: Special Guest    9/18/2017

It's time for some fresh thinking about voice services. Once the dominant source of revenue for mobile operators, voice calls are now a rare form of c…

Read More