







talk With SEA hackers, [we] Cyber Kendra have reported that SEA fequrently pentest US government servers and Networks. Moreover, they also mentioned that they have a huge amount of data collected from the previous hack. After US Army, now SEA targeted US intelligence and security organisation, and on the, [we] Cyber Kendra have reported that. Moreover, they also mentioned that they have a huge amount of data collected from the previous hack.





huge amounts of data containing details about the US army soldiers, officers, generals, etc... Another think they confirmed that, they also have some important and confidential files and reports. Unfortunately, in an statement given to Ars by Limelight spokesperson say - "we didn't have any evidence of customer data compromise". But SEA hackers confirmed to +Cyber Kendra that they haveetc... Another think they confirmed that, they also have some important and confidential files and reports.





UPDATE :- From Syrian Electronic Army

As on the tweet Syrian Electronic Army says "we were too later" by this SEA hackers means to say that, GCHQ DNS was hosted on the Limelight but they moved to another a while ago.



Syrian Electronic Army says to Cyber Kendra that GCHQ was not there target, it was US Army and they achieved it.

After hacking into the official site of US Army (army.mil), Pro hackers group Syrian Electronic Army have showed another hack. On the twitter account they posted the image of domain panel of the GCHQ.Syrian Electronic Army tweets the photo of Limelight control panel of GCHQ domain. Last time also SEA hackers have hacked into the limelight control panel of the US army website and thus deface it. Here once again they have hacked the GCHQ domain control panel.Theis a British intelligence and security organisation responsible for providing signals intelligence (SIGINT) and information assurance to the British government and armed forces.