Hackers claiming allegiance to ISIS have posted jihadist content on websites for several churches and organizations, and more web portals are vulnerable to the attacks. Jim Richter, pastor of Westminster Presbyterian Church, a Presbyterian Church in America (PCA) congregation in Johnson City, Tenn., learned about a cyberattack on his church’s site Jan. 22 when a church member sent him an email. The member visited the website and saw “I love ISIS and Jihad,” a violent video, and obscene language. The hackers claimed to be located in Algeria.
Richter’s church wasn’t the only hacking victim. The hackers also defaced the websites of Pastor Michael Milton, president of Faith for Living Inc., and Hope Presbyterian Church, another PCA church in Martinsville, Va.
Hope Presbyterian’s pastor David Gilleran, a retired military officer and chaplain, told me he was reluctant to give attention to the hack. “[The hackers] want free publicity,” he said.
“There are groups out there that do this every day, and they’re looking for publicity, as well as looking to try to unnerve people,” he told the Martinsville Bulletin.
Five More Talents, a web-hosting company for churches and Christian organizations, designed and hosted the three sites on a server in Texas. CEO Douglas Vos said the attacks were random; websites for a community college, wedding planner, and Virginia county government stored on the server were also defaced.
These attacks are common in the cybersecurity world. Small businesses, churches, and organizations can expect between 500 and several thousand attempted hacks each month, Vos said.
“It’s not a question of if you’ll be hacked, but when your website’s defaced what you’ll do next,” he said. “Most people are protected because of relative obscurity. But obscurity won’t protect you forever.”
Website hackers break into servers to harvest information or to deface websites, as in this case. Hackers frequently know before software companies when vulnerabilities occur. And vulnerabilities can occur at several different levels such as the server, server hardware, operating system, or control panels.
Click here to continue reading.
SOURCE: World Magazine – Courtney Crandell