Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Network Security
Real-time info services with Neustar
Average Rating:
Rate this article:  
Syrian Electronic Army Hacks Financial Times
Syrian Electronic Army Hacks Financial Times

By Jennifer LeClaire
May 17, 2013 11:17AM

    Bookmark and Share
"Some old tricks are good ones, and until we actually educate users to think before they click, these attacks will continue to be successful," said security analyst Ken Pickering. "There are vast architectural changes we could make to the Internet to make this happen, or we could all follow one simple policy: Don't enter your password on a link you followed from e-mail."
 



The Financial Times is the latest victim of the Syrian Electronic Army, a "hacktivist" group that supports Syrian President Bashar al-Assad. The U.K.-based newspaper reported the attack followed a phishing attack on the company's e-mail accounts.

Twelve posts entitled "Hacked by the Syrian Electronic Army" appeared on the FT's tech blog between 12:38 p.m. and 12:42 p.m. London time on Friday, with the company's Twitter accounts also disrupted, the Financial Times said.

"We have now locked those accounts and are grateful for Twitter's help on this," said Robert Shrimsley, the managing editor of FT.com. "Unfortunately this is an increasingly common issue for major news organizations."

No New Tricks

Ken Pickering, development manager for security intelligence at CORE Security, said the Syrian Electronic Army's methods are straightforward: They rely on a phishing e-mail with a link to a spoofed Web page that in some cases looks like Google Apps, and is able to yank an employee's credentials fairly easily.

"However, some old tricks are good ones, and until we actually educate users to think before they click, these attacks will continue to be successful," Pickering told us. "There are vast architectural changes we could make to the Internet to make this happen, or we could all follow one simple policy: Don't enter your password on a link you followed from e-mail. If you get a notification from somewhere, just go to the site itself via your browser. It will cost you an extra 10 seconds of typing, but I promise it's worthwhile."

People tend to reuse passwords, Pickering said, so tactics like this are easy and effective. Once hackers have access to e-mail, he said, injecting malware into a network by using internal e-mails as a carrier is exceptionally effective. And it only takes one weak link to begin a chain of several attacks.

"I wish I could say the SEA was doing something deeply complicated, but the real story is they keep burning these companies with tactics that are well established and well known," Pickering said. "That's why we see a significant amount of users using our products for phishing research, and to help train employees to not click on everything that enters their inbox. It's still a real issue out there."

A String of Hack Attacks

Last month, the Syrian Electronic Army hacked The Guardian, another U.K.-based newspaper. The hackers targeted The Guardian's Twitter account.

Hacks of high-profile news organizations' Twitter accounts have become so common that the micro-blogging site has sent a memo to them that warns it expects still more, and outlines several steps the organizations should take to deter the hacks.

"These incidents appear to be spear phishing attacks that target your corporate e-mail," the memo says. It lists several steps that should be taken immediately, along with others for the longer term.

"Change your Twitter account passwords," is one of the immediate steps the memo urges. "Never send passwords via e-mail, even internally. Ensure that passwords are strong -- at least 20 characters long. Use either randomly-generated passwords (like 'LauH6maicaza1Neez3zi') or a random string of words (like 'hewn cloths titles yachts refine')."

Among the longer-term changes Twitter urges for news organizations is to dedicate a single computer solely for posting tweets.

"Don't use this computer to read e-mail or surf the Web, to reduce the chances of malware infection," the memo says.

Twitter is working on beefing up its own security with a two-step authentication system for logging in, but has not yet implemented the system.
 

Tell Us What You Think
Comment:

Name:





 Network Security
1.   Tor Working To Fix Security Exploit
2.   Wall Street Journal Hacked Again
3.   Dropbox for Business Boosts Security
4.   Hackers Breached StubHub Accounts
5.   Banks Hit by Android-Skirting Malware


advertisement
Android SMS Worm on the Loose
Malware lets bad actors cash in.
Average Rating:
Tor Working To Fix Security Exploit
Bug reportedly reveals ID of users
Average Rating:
New Technology Defeats Privacy Efforts
Study identifies 3 browser techniques.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 
Dropbox for Business Beefs Up Security
Dropbox is upping its game for business users. The cloud-based storage and sharing company has rolled out new security, search and other features to boost its appeal for businesses.
 

Enterprise Hardware Spotlight
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Microsoft Makes Design Central to Its Future
Over the last four years, Microsoft has doubled the number of designers it employs, putting a priority on fashioning devices that work around people's lives -- and that are attractive and cool.
 
Contrary to Report, Lenovo's Staying in Small Windows Tablets
Device maker Lenovo has clarified a report that indicated it is getting out of the small Windows tablet business -- as in the ThinkPad 8 and the 8-inch Miix 2. But the firm said it is not exiting that market.
 

Mobile Technology Spotlight
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 
Is the Amazon Fire Phone a Winner?
A late entry into a packed category of smartphones, Amazon's Fire phone offers a variety of unique features. Now, the reviewers are assessing if they're enough to make the phone stand out.
 
Review: Amazon Fire Offers New Ways To Use Phones
The Fire phone uses Android, but Amazon has modified it to the point that it's barely recognizable. That means the phone offers new ways to navigate, discover and, of course, shop.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | CRM Systems | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.