CENTCOM Under Fire as Pro-ISIS Hackers Seize Twitter, YouTube Accounts

By

For anyone who's been on the Internet for any length of time, it's likely that person already knows someone who's had a Twitter, Facebook, or YouTube account hacked. This time, everybody knows someone who's experienced that particular breach of cybersecurity, as well as a YouTube account, thanks to a recent move by pro-ISIS hackers who seized the Twitter feeds and YouTube accounts of the U.S. Central Command (CENTCOM).

The hackers had control of the Twitter account for about 30 minutes, according to reports, before the account was taken down, but in that time, plenty of information went out including pro-ISIS messages (one message reportedly read “i love you isis”) as well as such things as the contact information of retired U.S. Army generals went out. Reportedly, the contact information was in many cases out of date, and none of it was classified, so it was more as if ISIS posted old photos of phone book pages. The YouTube channel, meanwhile, was subsequently hacked and saw two ISIS videos get posted.

Reports suggest the sites recovered quickly—a post on CENTCOM's Twitter feed noted “We're back!” not long after 10 p.m. Eastern, along with a link to a press release—and CENTCOM's YouTube channel appears to be back up and ISIS-free.

As for actual damage caused by this incident, it's really more a matter of a loss of face than anything else. It was once stated by popular science webcomic XKCD that, when the CIA's website is hacked, it's not that someone managed to break into some really spectacularly classified systems, but rather that instead someone managed to break into the most lightly-defended of all CIA operations, because it has the least to offer. Indeed, XKCD specifically compared it to the Web-based equivalent of “tearing down a poster the CIA put up.” Remember, ISIS didn't manage to hack CENTCOM here, but rather successfully guess CENTCOM's Twitter and YouTube passwords. In fact, it wouldn't be out of line to consider the possibility that the two may have been the same password, a practice often decried by security experts but often used by regular people too busy and / or lazy to remember more than one strong password so often prescribed by said experts. This is why so many often recommend the use of some breed of password management tool, and one preferably kept out of the computer's main drag, on something like a USB drive or the like as it allows passwords to be quickly updated and not easily forgotten. It's worth noting that CENTCOM's YouTube page has two videos of ISIL (which is another name for ISIS) warehouses being destroyed from a week ago, and the Twitter / YouTube hack may have been a kind of counter-reprisal.

While this is a kick in the pride for CENTCOM, it's really not much more than that. ISIS managed to pull off a very small, very trivial hack that made CENTCOM look like a bunch of barely computer-literate doofuses for a few hours. It does, however, serve as a bit of a warning for the rest of us, and potentially a nice wake-up call to maybe go and change our email passwords or similar if such hasn't been done recently. The importance of a strong password is hard to understate, and the online razzing that CENTCOM is likely to take over this will serve as a little reminder to the rest of us.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

Tech Innovation in iGaming

By: Contributing Writer    11/29/2023

iGaming is one of the fastest growing industries on the internet. For those who may not be aware, iGaming refers to online casinos, online slots, poke…

Read More

8 Underrated Features of Your Mobile Device You Probably Didn't Know About

By: Contributing Writer    11/21/2023

It is easy to get lost in all the new phone releases when multiple happen yearly. Consequently, most new functions go unnoticed because people do not …

Read More

Navigating the Launch: A Step-by-Step Guide to Bringing Your Product to Market

By: Contributing Writer    11/15/2023

Embarking on the journey to bring a new product into the marketplace is an exhilarating adventure that blends the thrill of innovation with the meticu…

Read More

Running MySQL on AWS: Step by Step

By: Contributing Writer    11/15/2023

MySQL on AWS is the deployment of the MySQL database system on Amazon Web Services (AWS) cloud platform. MySQL is one of the most popular open-source …

Read More

4 Easy Responsive Image Techniques

By: Contributing Writer    11/15/2023

Responsive images are a fundamental component in responsive web design. They adapt to the size of the user's screen, delivering the best user experien…

Read More