

Anonymous hacktivists just announced that they’ve taken down the Syrian Electronic Army hacktivists. Just last week, Syrian Electronic Army hit with a number of notable scalps, and took control of the New York Times, numerous Twitter domains, and the UK version of the Huffington Post.
The hack conducted by Syrian Electronic Army was followed by an attack on its own, when a group claiming association with Anonymous said that it has compromised SEA databases and servers.
Apparently, the Anonymous hacktivists have not only have compromised SEA servers, but have also obtained members’ names along with user IDs and passwords, and have copied gigabytes of SEA data. This is evident from the screenshots that the hackers posted on Twitter via their handle @blackplans, showing the SEA’s Parallels server, blog logins, and user credentials.
A @blackplans associate also said that Anonymous had already d0xed – that is, de-anoymised – “five core members” of the SEA. On the other hand, SEA denied that it has been compromised. On its official Twitter account – @Official_SEA16, it declared all screenshots fake.
“All the data that was leaked can’t be proved. Those hackers have been working since a long time and they have time to fake data about SEA, said a SEA Spokesperson.
Anonymous hacktivists believe that SEA works on behalf of the Syrian government. Besides with entering into western side, it is trying to tread into their territory. These are the main reasons that Anonymous hacktivists exposed SEA, which they said was an easy job.
“They left trails, nicknames, email addresses, modus operandi” and were therefore “easy to trace”. Moreover, “they reuse passwords as well” – something that would considerably simplify breaching systems.
In addition to account information, the breach also gave Anonymous hacktivists access to an account called @eagles_syrian which is associated with the SEA.
THANK YOU