On Thursday, November 16, we at the CyberToufan team carried out a comprehensive attack as part of the #OpCyberToufan and #OpIsrael campaign.
As confirmation of the organized attack, in the coming hours and days we will publish a press release and some of what we have, attached the keys for SSL encryption (with Zionist government websites) as proof of the scale of the attack.
On Thursday the 16th of November, we as Cyber Toufan launched a massive cyber attack as part of #OpCyberToufan and #OpIsrael .
We will be releasing a full media statement in the coming hours.
As proof of our operation and what will be released in the coming hours and days, here are a list of private keys and certificates (including .gov.il) for SSL from some of the hit servers.
#IsraelLeaks – Day One – Leak One – ACE Israel – #OpCyberToufan #OpIsrael
Bismillah..
Now.. For our first release we will start with a bit smaller of a target. Israel’s ACE Hardware (ace.co.il) knew that they got popped and that the Mujahideen has had every piece of information about all of their customers across their 28 branches in the country for some time now. Where they live, what they order, their names, numbers, and passwords. Even where they logged into their accounts from. But the Netanyahu government asked them to keep it all hush hush

Well.. It looks like The Cyber Toufan will have to be the first to inform their poor customers. Turns out that Falcon sensor did little good in the end.
Size of the SQL dump uncompressed: 16 GB
Links:
https://mega.nz/file/gmBzQApb#6U86yYFWqf3KbQbR42SaspezJd3h8PcRm3k1yg-RVpI
https://gofile.io/d/AB7Vfq
Password: @CyberToufan



You must be logged in to post a comment.