A pro-ISIS “hacking” group distributed its latest “kill” list this week.
It includes names, addresses, and email addresses belonging to 8,318 people and is one of the longest lists ISIS has distributed.
Of 7,848 people identified as being in the U.S., 1,445 were from California, 643 in Florida, 341 in Washington, 333 in Texas, 331 in Illinois, and 290 in New York.
The ‘ISIS kill list’ also includes the names of several Hollywood celebs.
Other names on the list belong to people in Canada, Australia, and the U.K.
The rest are people ISIS wants to target living in Belgium, Brazil, China, Estonia, France, Germany, Greece, Guatemala, Indonesia, Ireland, Israel, Italy, Jamaica, New Zealand, South Korea, Sweden and Trinidad and Tobago.
The Daily Mail reports:
The ISIS group, using the Russia-based app Telegram gave the names, addresses, and email addresses of 8,318 people in total, making it one of the longest kill lists ISIS have ever put out.
They urged their supporters to ‘kill them strongly to take revenge for Muslims’.
Authorities are investigating how personal information, containing names and addresses, ended up in the hands of one of the world’s most brutal terrorist organizations.
The disturbing development only goes to show the lengths to which ISIS will go to strike terror.
It also shows the danger of and the need to carefully monitor social media.
It should also serve as a warning to agencies maintaining databases to review their security protocols as it seems some database is being breached every week.
We live in a world of information. We put it all out freely and others like ISIS freely gather it up!
In 2015, a whopping 80 million patient and employee records, potentially exposing names, dates of birth, Social Security numbers,were breached at Anthem Blue Cross alone!
An image published alongside the ISIS “kill” list on Monday:
The ISIS Hacking Division has posted a ‘kill list’ containing the names, photos and addresses of 100 US military members. The group claims they obtained this information by hacking military servers and databases, but it’s unclear if the information was harvested from publicly available data.