CENTCOM Under Fire as Pro-ISIS Hackers Seize Twitter, YouTube Accounts

By

For anyone who's been on the Internet for any length of time, it's likely that person already knows someone who's had a Twitter, Facebook, or YouTube account hacked. This time, everybody knows someone who's experienced that particular breach of cybersecurity, as well as a YouTube account, thanks to a recent move by pro-ISIS hackers who seized the Twitter feeds and YouTube accounts of the U.S. Central Command (CENTCOM).

The hackers had control of the Twitter account for about 30 minutes, according to reports, before the account was taken down, but in that time, plenty of information went out including pro-ISIS messages (one message reportedly read “i love you isis”) as well as such things as the contact information of retired U.S. Army generals went out. Reportedly, the contact information was in many cases out of date, and none of it was classified, so it was more as if ISIS posted old photos of phone book pages. The YouTube channel, meanwhile, was subsequently hacked and saw two ISIS videos get posted.

Reports suggest the sites recovered quickly—a post on CENTCOM's Twitter feed noted “We're back!” not long after 10 p.m. Eastern, along with a link to a press release—and CENTCOM's YouTube channel appears to be back up and ISIS-free.

As for actual damage caused by this incident, it's really more a matter of a loss of face than anything else. It was once stated by popular science webcomic XKCD that, when the CIA's website is hacked, it's not that someone managed to break into some really spectacularly classified systems, but rather that instead someone managed to break into the most lightly-defended of all CIA operations, because it has the least to offer. Indeed, XKCD specifically compared it to the Web-based equivalent of “tearing down a poster the CIA put up.” Remember, ISIS didn't manage to hack CENTCOM here, but rather successfully guess CENTCOM's Twitter and YouTube passwords. In fact, it wouldn't be out of line to consider the possibility that the two may have been the same password, a practice often decried by security experts but often used by regular people too busy and / or lazy to remember more than one strong password so often prescribed by said experts. This is why so many often recommend the use of some breed of password management tool, and one preferably kept out of the computer's main drag, on something like a USB drive or the like as it allows passwords to be quickly updated and not easily forgotten. It's worth noting that CENTCOM's YouTube page has two videos of ISIL (which is another name for ISIS) warehouses being destroyed from a week ago, and the Twitter / YouTube hack may have been a kind of counter-reprisal.

While this is a kick in the pride for CENTCOM, it's really not much more than that. ISIS managed to pull off a very small, very trivial hack that made CENTCOM look like a bunch of barely computer-literate doofuses for a few hours. It does, however, serve as a bit of a warning for the rest of us, and potentially a nice wake-up call to maybe go and change our email passwords or similar if such hasn't been done recently. The importance of a strong password is hard to understate, and the online razzing that CENTCOM is likely to take over this will serve as a little reminder to the rest of us.




Edited by Maurice Nagle
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

Introducing the Newest Addition to ITEXPO #TECHSUPERSHOW: Enterprise Cybersecurity Expo

By: TMCnet News    6/11/2024

TMC today announced the launch of Enterprise Cybersecurity Expo, set to take place from February 11-13, 2025, in Fort Lauderdale, Florida, at the Brow…

Read More

The Shifting Landscape: Emergent Technological Paradigms in Online Sports Wagering

By: Contributing Writer    6/7/2024

In the ever-evolving sphere of online sports wagering, technological advancements have been instrumental in reshaping the landscape, altering how enth…

Read More

Unpacking The Differences: How CPaaS And Network APIs Drive Distinct Innovations

By: Special Guest    6/5/2024

While they share some technical synergies, CPaaS and Network APIs serve different markets and purposes, highlighting the need for complementary strate…

Read More

Protecting Your Digital Fortress Through Threat Exposure Management

By: Contributing Writer    5/23/2024

In today's digital landscape, cybersecurity threats loom large, posing significant risks to businesses, organizations, and individuals alike. With the…

Read More

Why Block Websites? Understanding the Reasons

By: Contributing Writer    5/6/2024

The internet is such an expansive network where every click can lead to information, entertainment, or opportunities for productivity. However, this a…

Read More