A band of vandals is taking credit for doxxing some 1,400 American military and government personnel. Identifying themselves as the Islamic State's "hacking division," the group is telling its followers to "act and kill" the infidels. That threat rings somewhat hollow -- because ISIS is bad at hacking.
This is at least the third time this year that ISIS has claimed to have hacked into government servers and extract the personal details of United States officials. "Hack" is a misleading verb, though, because in each of those instances, the terrorists didn't exactly compromise America's information security fortress. Either the "hacked" information was already public, or apparently completely fabricated. It would be more appropriate to describe this type of cyber warfare by saying something like "ISIS Googled military people" or "ISIS made up fake Gmail passwords for NASA officials." That's likely what really happened.
Ranking military officers revealed as much in their response to this latest ISIS non-hack. "This is the second or third time they have claimed that and the first two times I'll tell you, whatever lists they got were not taken by any cyber attack," General Ray Odierno, the Army's chief of staff, said after records were made public on Wednesday. "But I take it seriously because it's clear what they're trying to do ... even though I believe they have not been successful with their plan."
The other instances to which General Odierno is referring are probably the CENTCOM non-hack in January of this year and the non-doxxing of U.S. soldiers in March. In both of those non-attacks, the information that the ISIS "hacking division" exposed was already public. ISIS sympathisers have been successful in breaking into some official military social media accounts, though the level of hacking skill required to accomplish such a feat is roughly equivalent to the amount of effort it takes to solve a New York Times crossword puzzle -- one from early in the week, mind you.
This is not to say that ISIS isn't a group of violent terrorists. They certainly are. It would also be disingenuous to say that we shouldn't be worried about hackers from within its ranks, and from other terrorist groups. We should be quite worried in times like these, if only because our own government seems pretty hapless in its understanding of cybersecurity.
However, this is not the time to freak out -- these are self-proclaimed hackers describing themselves as bloodthirsty jihadists who have just released a bunch of public information on the public internet. This time around, the information even appears to be totally made up. "It's pretty clear that [the data's] been aggregated from different sources," said security expert Troy Hunt explained in a well sourced blog post. "Even the passwords, they're not strong enough to have come from a corporate or government. They're not even strong enough to have come from an online service -- you can't create a Gmail account, for example, with a password of less than eight characters, and here we're seeing some passwords of three letters."
So even if you generally assume the U.S. government isn't great at security, you could probably bet that members of the military would need passwords longer than three characters. So then you have to assume that these self-described ISIS hackers are either bad at hacking or just bad at making stuff up. Frankly, it's probably a little bit of both.
Image via Reddit