Data from the Anonymous OpKKK released

Data from the Anonymous “OpKKK” released

 At 3:26 pm CDT, the infamous hacking group Anonymous finally released the data on the Klu Klux Klan it had been promising for the past few weeks.  Anonymous revealed the length that the operation had been in play, stating “Data collected for Operation KKK was gathered over approximately 11 months.”

The fairly sizable dump was only around 400 names, even though Anonymous promised more than 1000 with the group seeming to promise more stating “The anons at @Operation_KKK are responsible for this specific liberation of information and we have done our best to ensure accuracy and avoid collateral damage to innocent parties. Erring on the side of caution, we removed several names from this list for further evaluation.”  This may indicate that are more recognizable, but are yet to be released pending further investigation.


One point that can be made here was revealed by Anonymous, “and those included on this list were identified primarily through HUMINT (human intelligence) data collection strategies.”  Social Engineering was the main tool used to collect most of the data.  “This is a broad array of information and sources that are generally available to the public. This includes: multimedia, academic records and public data. Members often told on themselves to us about their connections with the KKK during various chat conversations we had with klan members and affiliates throughout the course of our operation. You never know who you are talking to on the internet.”

“Members often told on themselves to us about their connections with the KKK during various chat conversations we had with Klan members and affiliates throughout the course of our operation,” OpKKK said. “You never know who you are talking to on the Internet.”


This further highlights the need for security awareness training for those who hold sensitive information from passwords to critical systems to the mail office workers who at the bottom.

Check back for further updates as they unfold.

Other High Profile Breaches:

Experian (includes T-Mobile)
Trump Hotels
Tesla and Chrysler (unrelated to each other)
Apple App Store
U.S. Office of Personnel Management (OPM)
Kaspersky & FireEye (unrelated to each other)
Excellus Blue Cross Blue Shield
Ashley Madison
Ashley Madison (follow up)

Thanks for stopping by and reading our blog. We would appreciate if you could subscribe (assuming you like what you read; we think you will). This is meant to be informative and to provide value to anyone who reads this – regardless of their knowledge and/or understanding of IT/Cybersecurity. To learn more about us, check out our “About Us” page.

Be sure to subscribe to this blog and to our Podcast.

If you have ANY Cybersecurity needs, please contact us and a member of our staff with promptly reply to your question or concern.


The Hill

Enter your email address:

Delivered by FeedBurner

Subscribe to our mailing list

* indicates required

About Matthew Eliason

Matthew Eliason was born in Houston, Texas.  Upon graduating from high school, he joined the Navy.  His first tour was as an Information Systems Technician of a 130 client DOD network where he developed the documentation and maintenance procedures from 2007-2012.  In 2012, he transferred shore duty where he serves as a system and security administrator. He graduates with a Bachelor’s of Science in Information Technology from American Military University in November of 2015. He holds the CompTIA Security+ certification and has extensive experience in DOD Information Assurance (IA) and Cyber Security compliance and procedures.  He enjoys golf, hiking, watching football in his spare time.