Since the start of June, different members of Ghost Squad Hackers have been working together to begin releasing the free version of sources codes to tools they’ve used throughout the past.
Yesterday evening, M1r0x of Ghost Squad Hackers hacked and defaced a Government web portal owned by the Bung Subdistrict Administrative Organization of Thailand, their first such public hack since February 9th 2019.
Ghost Squad Hackers Release Contents from Internal Operation Known as #OpDecryptISIS, Exposing +1GB of Compressed Data Related To ISIS Members, Recruiters & Sympathizers Online
S1ege of Ghost Squad Hackers releases a massive file archive containing the identities of countless ISIS leaders, recruiters and sympathizers, compiled as the result of an internal operation unique to GSH known as #OpDecryptISIS
M1r0x of Ghost Squad Hackers hacks/defaces a technological training school in Bangladesh, editing articles with a list of GSH members and using the hack as platform to announce a new offensive against the Islamic State in 2019.
In conjunction with #OpISIS, Ghost Squad Hackers have released the IP Address, phone number, call logs and contact lists of terrorists operating out of Libya – the 3rd such leak in the last 2 weeks.