Hackers ‘sabotaged’ Army recruitment website – official | Inquirer News
SITE SHUT DOWN

Hackers ‘sabotaged’ Army recruitment website – official

/ 02:34 PM April 30, 2019

Hackers ‘sabotaged’ Army recruitment website – official

SCREENGRAB from www.jointhearmy.ph

MANILA, Philippines — The Philippine Army’s recruitment website, jointhearmy.ph, went offline Tuesday morning after it was allegedly compromised by hackers.

“We shut down the website to prevent further complications to the site so we can investigate and rectify the problem,” said Army spokesperson Lt. Col. Ramon Zagala.

ADVERTISEMENT

“At 8 a.m. this morning, April 30, the hacker group Pinoy Lulzsec sabotaged the site and effectively curtailed the dreams and aspirations of many young men and women as they take the first steps in joining the noble profession of arms,” he also said.

FEATURED STORIES

One of the hackers claimed on social media that around 50,000 applicants’ details were compromised.

But Zagala dismissed these claims saying the website was not part of the Philippine Army Network.

The website, put up with the help of reservists, was designed to step up recruitment efforts of the Philippine Army.

Zagala said they are already in touch with the creators of the website to take appropriate actions.

Pinoy Lulzsec has been previously linked to hacking websites of government and private firms. In 2016, it exposed records of millions of registered Filipino voters.  /kga

RELATED STORY

ADVERTISEMENT

PH Army steps up online drive to seek recruits

Your subscription could not be saved. Please try again.
Your subscription has been successful.

Subscribe to our daily newsletter

By providing an email address. I agree to the Terms of Use and acknowledge that I have read the Privacy Policy.

TAGS: Army, data breach, hacking, Local news, Nation, national news, News, Pinoy LulzSec, Ramon Zagala

© Copyright 1997-2024 INQUIRER.net | All Rights Reserved

We use cookies to ensure you get the best experience on our website. By continuing, you are agreeing to our use of cookies. To find out more, please click this link.