Iran hacks American government website’ warns’this is just the beginning’

The American government website has been targetted by hackers claiming to be from Iran.

The American website for the Federal Depository Library Program, fdlp.gov, was hacked by hackers allegedly from Iran showing a picture pf Donal Trump being punched in the face with a message from the ‘the Islamic Republic of Iran’.

‘Iran hacks American government website’ warns ‘this is just the beginning’

On the website which was defaced with US President’s bleeding face had below the image words that reads;

‘Hacked by Iran Cyber Security Group Hackers’ and ‘this is only a small part of Iran’s cyber ability’. The chilling warning said ‘martyrdom was (Suleimani’s)… reward for years of implacable efforts’. ‘With his departure and with God’s power, his work and path will not cease and severe revenge awaits those criminals who have tainted their filthy hands with his blood and blood of the other martyrs’.

However, a US government spokesperson said ‘there is no confirmation’ this attack came from Iran, the Mirror reports.

This comes after Donald Trump warned Iran that if they tried their retaliatory attack, the US will target 52 Iranian sites.  To retaliate the attack, Iran has identified atleast 35 US targets.

It all started after the President of America ordered an airstrike that killed one of their top general, Qassem Soleimani.

Follow us on Facebook – pillar’s wall

Published by Stephen Stelly Benneth

I serve you with the best of explores

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create your website with WordPress.com
Get started
<span>%d</span> bloggers like this: