Earlier this morning, February 12th 2019, “S1ege” of Ghost Squad Hackers released a treasure trove of leaked documents compiled as the result of something known as “Operation Decrypt ISIS” (#OpDecryptISIS), an exclusive operation unique to Ghost Squad Hackers. In a personal interview with Rogue Media Labs, S1ege explains how the data provided below comes as the result of months of work, time spent quietly working behind the scenes infiltrating ISIS networks, socially engineering its members and compromising their administrators online.
Unlike operations of the past, such as #OpISIS and #OpIceISIS, largely carried out under the banner of the Anonymous Hacker Collective and which typically targeted low level members of ISIS located on the ClearNet, Ghost Squad’s most recent operation was unique in the fact that it was almost exclusively designed “to take out the top chain of ISIS’s command” – which also subsequently led to the uncovering of countless lower level members involved with the terror group.
Operation Decrypt ISIS Raw Press Release: https://hastebin.com/aqupasaboz.coffeescript
Included in the leaked material provided below are rooted phone numbers belonging to ISIS members, the account names and numbers of ISIS members operating on encrypted Voice-Over-Internet-Protocol (VoIP) services such as WhatsApp or Telegram, as well as detailed logs stolen from ISIS members as they browsed through the internet. The leak also contains detailed files on the identities of ISIS members extracted from various accounts, chatrooms and web pages across the internet, divided across the following countries: Algeria, Australia, Belgium, Ghana, India, Indonesia, Libya, Morocco, Palestine, Moldova, Syria, Turkey, Uganada and Yemen. Ghost Squad also attached a separate file of ISIS member compromised via their VPN connections. The individual file folders contained with the leak also contain Personally Identifiable Information (PII) on countless terror members, including their “Phones, Geolocation, Cameras, Telegram accounts, numbers and channels, Facebook profiles, Twitter accounts, personal ID’s, Credit Card details and IP Logs.”
Screen Shot of Main Leak:
It should be noted however that the information contained within the leaked files only includes information on those who are either directly operating under the flag of ISIS, or directly participating within clandestine communications associated with the terror group. Quite simply, you do not find your way into these sorts of rooms or channels by accident, meaning that everyone named in the leak represents legitimate targets either actively participating with ISIS or attempting to learn how to do so. Either way, they are all guilty – even if by nothing other than association.
In a message attached to the leak, S1ege wanted the world to know that:
“The Islamic state is far from dead..
People fail to realize that Isis is a lot like a decentralized movement, they operate primarily based on ideologies. They’re not a centralized group or physically located anywhere. Think deeply about the fact that most of the Islamic state’s attacks globally aren’t executed by some foot soldier sent abroad to carry out an operation/terrorist attack handed to him by Isis’ chain of command, rather, they’re done by lone wolves inspired by radical ideologies discovered somewhere on the internet – not their local mosque’s.
Presidents fails to acknowledge what causes the Islamic state to gain in numbers, fails to understand how to tackle the core/root problem. Isis/terrorism will never die, so long as one remaining member creates propaganda GSH will continue to combat Isis wherever, whenever on the internet.
Encrypted or decrypted we will find you and expose you Isis…“
Browse Through Entire File Archive Leak: https://mega.nz/#F!izo1XC7Q!xq18rHeHzwJrss9sJrIoTQ
Contacts Data from Hacked Islamic State Admin’s Phones:
Raw Leak (77KB): https://hastebin.com/bomucocivu.shell
SMS Data from Hacked Islamic Stat Admin’s Phones:
Call log Data from Hacked Islamic State Admin’s Phones:
File Archive Backup 1: https://anonfile.com/62q7Gct3b2/Operation_Decrypt_Isis_GSH_zip
File Archive Backup 2: https://roguemedialabs.com/operation-decrypt-isis-gsh/
Auto-Download Backup: https://roguemedialabs.com/wp-content/uploads/2019/02/Operation-Decrypt-Isis-GSH.zip
While today’s leak comes as something of a surprise, after talking with various group members over the course of the last several weeks and months perhaps it shouldn’t have. I say this because while they never hinted that a large scale release was immediately immanent, Ghost Squad Hackers have been making it clear that they intend to make 2019 the year in which this Islamic States online presence is finally exterminated once and for good. For example, these were sentiments echoed by M1r0x of GSH just last week.
Even with the release this week, the fight isn’t over and new intelligence indicates the Islamic State has once again started shifting their presence to a newer means of communication – such as ZeroNet. As always, the fight continues….
Browse Through Some of The Leaks Featured Above:GSH_Leak
Categories: Hacking News