NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

Twitter account of Centcom’s hacked

A part of Anonymous claims the computers used to hack on Centcom’s Twitter and YouTube reports were found in Maryland.

The folks on the other side of the assault released several files it claimed to have stolen using qualifications that were endangered, but a large proportion of these were accessible online. Yet Centcom has verified that a number of the information that was leaked was formerly freely unavailable.

Twitter report @TheAnonMessage maintained the attacks came from inside the usa just after the accounts were endangered.

The report additionally listed 11 IP addresses it promises were used in the assault.

A computer’s IP address alone isn’t a precise indicator of where an attack is coming from, as the strike can simply make use of VPN or a proxy server to spoof its source.

Conspiracy theories

The FBI who has declared this is investigating the assault has not verified it.

The attacker’s identity remains unknown right now, though the hacker’s IP addresses are readily discoverable as well as if Anonymous is right, it implies that it shouldn’t be overly long before the offender is discovered.

But if we’ve learned anything about the NSA in the past year or two, it’s they are unlikely to show their place so readily and have access to highly advanced technology.

by admin on January 16th, 2015 in Hacker attack

There are no comments.

Name: Website: E-Mail:
XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>