News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
GET RECOGNIZED.
Let an ISACA® certification
elevate your career.

Register today and save
You are here: Home / Network Security / Financial Times Latest Hacking Target
DDoS Protection Powered By Verisign
Syrian Electronic Army Hacks Financial Times
Syrian Electronic Army Hacks Financial Times
By Jennifer LeClaire / NewsFactor Network Like this on Facebook Tweet this Link thison Linkedin Link this on Google Plus
PUBLISHED:
MAY
17
2013

The Financial Times is the latest victim of the Syrian Electronic Army, a "hacktivist" group that supports Syrian President Bashar al-Assad. The U.K.-based newspaper reported the attack followed a phishing attack on the company's e-mail accounts.

Twelve posts entitled "Hacked by the Syrian Electronic Army" appeared on the FT's tech blog between 12:38 p.m. and 12:42 p.m. London time on Friday, with the company's Twitter accounts also disrupted, the Financial Times said.

"We have now locked those accounts and are grateful for Twitter's help on this," said Robert Shrimsley, the managing editor of FT.com. "Unfortunately this is an increasingly common issue for major news organizations."

No New Tricks

Ken Pickering, development manager for security intelligence at CORE Security, said the Syrian Electronic Army's methods are straightforward: They rely on a phishing e-mail with a link to a spoofed Web page that in some cases looks like Google Apps, and is able to yank an employee's credentials fairly easily.

"However, some old tricks are good ones, and until we actually educate users to think before they click, these attacks will continue to be successful," Pickering told us. "There are vast architectural changes we could make to the Internet to make this happen, or we could all follow one simple policy: Don't enter your password on a link you followed from e-mail. If you get a notification from somewhere, just go to the site itself via your browser. It will cost you an extra 10 seconds of typing, but I promise it's worthwhile."

People tend to reuse passwords, Pickering said, so tactics like this are easy and effective. Once hackers have access to e-mail, he said, injecting malware into a network by using internal e-mails as a carrier is exceptionally effective. And it only takes one weak link to begin a chain of several attacks.

"I wish I could say the SEA was doing something deeply complicated, but the real story is they keep burning these companies with tactics that are well established and well known," Pickering said. "That's why we see a significant amount of users using our products for phishing research, and to help train employees to not click on everything that enters their inbox. It's still a real issue out there."

A String of Hack Attacks

Last month, the Syrian Electronic Army hacked The Guardian, another U.K.-based newspaper. The hackers targeted The Guardian's Twitter account.

Hacks of high-profile news organizations' Twitter accounts have become so common that the micro-blogging site has sent a memo to them that warns it expects still more, and outlines several steps the organizations should take to deter the hacks.

"These incidents appear to be spear phishing attacks that target your corporate e-mail," the memo says. It lists several steps that should be taken immediately, along with others for the longer term.

"Change your Twitter account passwords," is one of the immediate steps the memo urges. "Never send passwords via e-mail, even internally. Ensure that passwords are strong -- at least 20 characters long. Use either randomly-generated passwords (like 'LauH6maicaza1Neez3zi') or a random string of words (like 'hewn cloths titles yachts refine')."

Among the longer-term changes Twitter urges for news organizations is to dedicate a single computer solely for posting tweets.

"Don't use this computer to read e-mail or surf the Web, to reduce the chances of malware infection," the memo says.

Twitter is working on beefing up its own security with a two-step authentication system for logging in, but has not yet implemented the system.

Tell Us What You Think
Comment:

Name:

Like Us on FacebookFollow Us on Twitter
TOP STORIES NOW
MAY BE OF INTEREST
Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.
MORE IN NETWORK SECURITY
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Are Government Spies Tipping Off Tor?
Less than a month ago, tech news headlines heralded a Tor Project breach. Now, some are saying that government spies are sharing information with Tor to help it prevent future breaches.
 
Backoff Malware Hits 1,000+ Businesses, Likely More
More than 1,000 businesses across the U.S. might have been affected by Backoff, a new kind of point-of-sale (PoS) malware, according to the Department of Homeland Security.
 
PlayStation Network Back Online After Attack
Sony’s PlayStation and Entertainment Network are back online after a distributed denial of service (DDoS) attack crashed the systems on Sunday. But Sony says no personal info was accessed.
 

Enterprise Hardware Spotlight
Alert: HP Recalls 5 Million Notebook AC Power Cords
HP is recalling about 5.6 million notebook computer AC power cords in the U.S. and another 446,700 in Canada because of possible overheating, which can pose a fire and burn hazard.
 
Acer's New Desktop Box Rides the Chrome OS Wave
Filling out its Chrome OS line, Acer is following the introduction of a larger Chromebook line earlier this month with a new tiny $180 desktop Chromebox and also a smaller Chromebook.
 
Feds OK $2.3 Billion IBM-Lenovo x86 Server Deal
IBM and Lenovo are celebrating U.S. approval of their x86-based server deal, having cleared some major security hurdles. The deal makes Lenovo a major player for enterprise data centers.
 

Mobile Technology Spotlight
Verizon Hops on the Voice-Over-LTE Bandwagon
Wireless provider Verizon is gearing up for a nationwide launch of its Voice-over-LTE service over the next several weeks, promising clearer and crisper phone calls and a Skype-like video service.
 
Smartphone 'Kill Switch' Law in California; Will Other States Follow?
California’s new law -- signed by Gov. Jerry Brown on Monday -- aimed at deterring cellphone theft could mean most mobile phones sold in the U.S. will soon include similar “kill-switch” tech.
 
Apple To Replace 'Small Percentage' of iPhone 5 Batteries
If you've noticed your iPhone 5 isn't acting right, it might be because of a bad battery -- and you might be eligible for a replacement. Apple is offering new batteries, though only for a small percentage of users.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.