{
	"id": "760a6fc3-a6ed-4a36-b167-dfc4ab1015e2",
	"created_at": "2026-04-06T00:07:58.798901Z",
	"updated_at": "2026-04-10T03:29:55.155751Z",
	"deleted_at": null,
	"sha1_hash": "4a7956f4710390be9bb3946afe20dcf2006c0b52",
	"title": "Isis 'hacking division' releases details of 1,400 Americans and urges attacks",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 35708,
	"plain_text": "Isis 'hacking division' releases details of 1,400 Americans and urges\r\nattacks\r\nBy Michael Safi\r\nPublished: 2015-08-13 · Archived: 2026-04-05 16:50:29 UTC\r\nA group calling itself the Islamic State hacking division has published the details of 1,400 mostly US military and\r\ngovernment personnel, urging supporters to attack those listed.\r\nThe spreadsheet, published online on Wednesday, exposes names, email addresses, phone numbers and passwords.\r\nThose listed include members of the marine corps, Nasa, the state department, air force and FBI.\r\nSupporters of Isis on Twitter seized on the breach, posting personal details of soldiers and government staffers and\r\nencouraging lone wolves to “act and kill”.\r\nA person claiming to speak for the group told the Guardian the information was obtained from military and\r\ngovernment databases, a claim on which US army officials threw doubt.\r\n“This is the second or third time they’ve claimed that and the first two times I’ll tell you, whatever lists they got\r\nwere not taken by any cyber attack,” the army chief of staff, Gen Ray Odierno, said on Wednesday.\r\n“This is no different than the other two,” he said, referring to earlier so-called hacks by Isis supporters in January\r\nand May.\r\n“But I take it seriously because it’s clear what they’re trying to do ... even though I believe they have not been\r\nsuccessful with their plan,” he said.\r\nA computer security expert, Troy Hunt, also cast doubt on the alleged hack, suggesting much of it could have been\r\nscraped from existing data breaches or publicly available information.\r\n“It’s pretty clear that it’s been aggregated from different sources,” he said. “It’s been put together on the basis of a\r\n.gov or .mil address. Even the passwords, they’re not strong enough to have come from a corporate or\r\ngovernment.\r\n“They’re not even strong enough to have come from an online service - you can’t create a Gmail account, for\r\nexample, with a password of less than eight characters, and here we’re seeing some passwords of three letters.”\r\nThe Pentagon said it was still looking into the incident.\r\n“We don’t really have much [information] because most of the email addresses appear to be really old and\r\npasswords listed in the tweet don’t match up with our password strength requirements,” marine Lt Col Jeffrey\r\nPool said.\r\nhttps://www.theguardian.com/world/2015/aug/13/isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks\r\nPage 1 of 2\n\nAmong the first to post the spreadsheet was the hacker Junaid Hussain, reportedly third on a CIA “kill list” of Isis\r\nmembers and supporters.\r\nThe British national has been linked to the gunmen who attacked a prophet-Muhammad drawing contest in Texas\r\nin May.\r\nOnly the Isis leader, Abu Bakr al-Baghdadi, and its most prominent executioner, Mohammed Emwazi, are higher\r\non the CIA list.\r\nAlso listed were at least eight Australians, including a member of the Victorian parliament and members of the\r\nAustralian defence forces.\r\nSource: https://www.theguardian.com/world/2015/aug/13/isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks\r\nhttps://www.theguardian.com/world/2015/aug/13/isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks\r\nPage 2 of 2",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA"
	],
	"references": [
		"https://www.theguardian.com/world/2015/aug/13/isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks"
	],
	"report_names": [
		"isis-hacking-division-releases-details-of-1400-americans-and-urges-attacks"
	],
	"threat_actors": [
		{
			"id": "ea4f255b-346d-4907-a801-1f797a99d4b0",
			"created_at": "2023-01-06T13:46:38.693529Z",
			"updated_at": "2026-04-10T02:00:03.070408Z",
			"deleted_at": null,
			"main_name": "Cyber Caliphate Army",
			"aliases": [
				"UUC",
				"CyberCaliphate",
				"Islamic State Hacking Division",
				"CCA",
				"United Cyber Caliphate"
			],
			"source_name": "MISPGALAXY:Cyber Caliphate Army",
			"tools": [],
			"source_id": "MISPGALAXY",
			"reports": null
		},
		{
			"id": "17349388-cae3-44b2-8f8b-225b91aebe15",
			"created_at": "2022-10-25T16:07:23.519419Z",
			"updated_at": "2026-04-10T02:00:04.638033Z",
			"deleted_at": null,
			"main_name": "Cyber Caliphate Army (CCA)",
			"aliases": [
				"ATK 133",
				"Cyber Caliphate Army (CCA)",
				"Islamic State Hacking Division",
				"TAG-CT6",
				"United Cyber Caliphate (UCC)"
			],
			"source_name": "ETDA:Cyber Caliphate Army (CCA)",
			"tools": [],
			"source_id": "ETDA",
			"reports": null
		}
	],
	"ts_created_at": 1775434078,
	"ts_updated_at": 1775791795,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/4a7956f4710390be9bb3946afe20dcf2006c0b52.pdf",
		"text": "https://archive.orkl.eu/4a7956f4710390be9bb3946afe20dcf2006c0b52.txt",
		"img": "https://archive.orkl.eu/4a7956f4710390be9bb3946afe20dcf2006c0b52.jpg"
	}
}