Doubts cast on Islamic State's so-called leak of US .mil, .gov passwords

'Hacking Division' dumps 'data' on US govt workers – and a woman in Stockport, UK


Updated Islamic State's frothing fanatics have leaked online what they claim to be the email addresses and plaintext passwords of 1,500 American military personnel – including CIA staff.

The details include full names, email addresses, unencrypted passwords, ZIP codes, places of work, and telephone numbers. They come in a format that strongly suggests the group got hold of an Excel spreadsheet, converted it into an HTML table, and posted the results on the web.

The self-titled "Islamic State Hacking Divison [sic]" claimed responsibility for the alleged leak on Twitter, and its account was deleted in the past few hours. The data appeared on Tuesday, on a compromised Wordpress-powered website that has languished unused since February this year.

The records include details supposedly on US State Department employees, US Navy, Army and Air Force staff, and NASA bods. There's also a mix of US Embassy staffers, Department of Energy workers, US Postal Service employees, patent office staff, and more.

The "hackers" proclaimed on their webpage "US Military And Government Emails, Passwords, Names, Phone Numbers and Location Information Leaked."

But something's not right. There are lots of entries for people with non-US addresses – such as a worker in an Israeli magistrates' court (court.gov.il), someone in a college in Mississippi (millsaps.edu), a person in the Australian National Audit Office (anao.gov.au), and a UK council worker (stockport.gov.uk).

It's almost as if someone has scraped the public internet for email addresses with "gov" or "mil" in them. There are also just a handful of accounts listed per organization, whereas millions of people work for Uncle Sam.

And the plaintext passwords are hilariously weak – like "david8" weak. The sort of password you wouldn't expect a military or government network to accept. A US Department of Defense source, speaking on condition of anonymity, told The Register the listed passwords are not strong enough to be used on official systems.

We randomly chose and called a number of individuals on the list. In some cases, the numbers worked but no one picked up, and in others, the numbers were disconnected. The dumped information also includes what appears to be three sets of credit card numbers, and screenshots of private Facebook conversations between serving US military personnel discussing operations.

It's unclear where the information came from. It is unclear whether the information is in any way accurate or up to date. It is not clear if the passwords are real or bogus, nor what they can actually be used to access, if anything. It is highly likely the data came from scraping public lists of contact details. There is very little to suggest government systems have been directly compromised.

It's possible the information was acquired by phishing people, who handed over some details about themselves, or by compromising their private social networking accounts, or by obtaining old information leaked from other breached websites.

"As you continue your agression [sic] towards the Islamic State and your bombing campaign against the muslims, know that we are in your emails and computer systems," the Islamic State Hacking Division wackos wrote atop their info dump, "watching and recording your every move, we have your names and addresses, we are in your emails and social media accounts."

A spokeswoman at the Pentagon told The Register officials are aware of the alleged leak. "We cannot confirm credibility at this time. The safety of our service members is always a primary concern," she added. ®

Updated to add

Troy Hunt, who runs the Have I Been Pwned website, has weighed in, pointing out many flaws in the dumped data: the listed folks "are often not in defence or intelligence roles," and "the data is almost certainly from multiple locations and very unlikely to be from a single data breach."

Crucially, as El Reg suspected, "most of the data is easily discoverable via either existing data breaches or information intentionally made public," Hunt noted.

Similar topics


Other stories you might like

  • Want to buy your own piece of the Pi? No 'urgency' says Upton of the listing rumours

    A British success story... what happens next?

    Industry talk is continuing to circulate regarding a possible public listing of the UK makers of the diminutive Raspberry Pi computer.

    Over the weekend, The Telegraph reported that a spring listing could be in the offing, with a valuation of more than £370m.

    Pi boss, Eben Upton, described the newspaper's article as "interesting" in an email to The Register today, before repeating that "we're always looking at ways to fund the future growth of the business, but the $45m we raised in September has taken some of the urgency out of that."

    Continue reading
  • All change at JetBrains: remote development now, new IDE previewed

    Security, collaboration, flexible working: Fleet does it all apparently

    JetBrains has introduced remote development for its range of IDEs as well as previewing a new IDE called Fleet, which will form the basis for fresh tools covering all major programming languages.

    JetBrains has a core IDE used for the IntelliJ IDEA Java tool as well other IDEs such as Android Studio, the official programming environment for Google Android, PyCharm for Python, Rider for C#, and so on. The IDEs run on the Java virtual machine (JVM) and are coded using Java and Kotlin, the latter being primarily a JVM language but with options for compiling to JavaScript or native code.

    Fleet is "both an IDE and a lightweight code editor," said the company in its product announcement, suggesting perhaps that it is feeling some pressure from the success of Microsoft's Visual Studio Code, which is an extensible code editor. Initial language support is for Java, Kotlin, Go, Python, Rust, and JavaScript, though other languages such as C# will follow. Again like VS Code, Fleet can run on a local machine or on a remote server. The new IDE uses technology developed for IntelliJ such as its code-processing engine for features such as code completion and refactoring.

    Continue reading
  • Nextcloud and cloud chums fire off competition complaint to the EU over Microsoft bundling OneDrive with Windows

    No, it isn't the limited levels of storage that have irked European businesses

    EU software and cloud businesses have joined Nextcloud in filing a complaint with the European Commission regarding Microsoft's alleged anti-competitive behaviour over the bundling of its OS with online services.

    The issue is OneDrive and Microsoft's habit of packaging it (and other services such as Teams) with Windows software.

    Nextcloud sells on-premises collaboration platforms that it claims combine "the convenience and ease of use of consumer-grade solutions like Dropbox and Google Drive with the security, privacy and control business needs." Microsoft's cloud storage system, OneDrive, is conspicuous by its absence.

    Continue reading

Biting the hand that feeds IT © 1998–2021