The Biter Bit – After Hacking Microsoft, the Syrian Electronic Army was Hacked by a Turkish Group

At that time, SEA told Infosecurity, "we gained access to important documents about monitoring accounts/emails by Microsoft. It's still about Syria. And we will detail that soon."

This weekend SEA took further action against Microsoft, briefly gaining access to to a Microsoft News and an Xbox Twitter account, and a TechNet Microsoft blog. Via the news account SEA retweeted its earlier message about Microsoft "selling the data to the governments." 

SEA explained further in an email to Mashable: "Microsoft is monitoring emails accounts and selling the data for the American intelligence and other governments. And we will publish more details and documents that prove it. Microsoft is not our enemy but what they are doing affected the SEA."

For its part, Microsoft responded with the statement, "We’re actively investigating issues and are focused on protecting our employees and corporate network. Microsoft is sometimes obligated to comply with legal orders from governments around the world and provides customer data only in response to specific, targeted, legal demands."

It is reasonable to assume that Microsoft has been required by US law enforcement to hand over access to anything it has on SEA.

But now it appears that the biter has been bit. The Hacker News reported yesterday, "The Syrian Electronic Army, who has hacked hundreds of High Profile targets in 2013-14, today they got hacked by a Turkish hacker." That hacker is the TurkguvenLigi group. Zone-h lists a total of 203 alleged hacks by TurkguvenLigi, including el-Reg and most recently open-SSL. 

The message left by the Turkish group on the SEA website said, "You imbecils will attack our country with fake phishing emails and we’ll accept your lies and dont do anything?" It then quoted from the Koran: "Deem not that Allah is unaware of what the wicked do. He but giveth them a respite..."

At the time of writing this report, the SEA website is unobtainable, but a brief and typically taunting twitter conversation between the two hacking groups can be found here.

What’s hot on Infosecurity Magazine?