Newsletters
News & Information for Technology Purchasers NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Please click for more information, or scroll down to pass the ad, or Close Ad.
Home Enterprise I.T. Cloud Computing Applications Hardware More Topics...
Barium Ferrite (BaFe):
Higher Capacity, Superior
Performance, Longer Archival Life

www.thefutureoftape.com
Network Security
24/7/365 Network Uptime!
Average Rating:
Rate this article:  
Syrian Electronic Army Hacks Financial Times
Syrian Electronic Army Hacks Financial Times

By Jennifer LeClaire
May 17, 2013 11:17AM

    Bookmark and Share
"Some old tricks are good ones, and until we actually educate users to think before they click, these attacks will continue to be successful," said security analyst Ken Pickering. "There are vast architectural changes we could make to the Internet to make this happen, or we could all follow one simple policy: Don't enter your password on a link you followed from e-mail."
 



The Financial Times is the latest victim of the Syrian Electronic Army, a "hacktivist" group that supports Syrian President Bashar al-Assad. The U.K.-based newspaper reported the attack followed a phishing attack on the company's e-mail accounts.

Twelve posts entitled "Hacked by the Syrian Electronic Army" appeared on the FT's tech blog between 12:38 p.m. and 12:42 p.m. London time on Friday, with the company's Twitter accounts also disrupted, the Financial Times said.

"We have now locked those accounts and are grateful for Twitter's help on this," said Robert Shrimsley, the managing editor of FT.com. "Unfortunately this is an increasingly common issue for major news organizations."

No New Tricks

Ken Pickering, development manager for security intelligence at CORE Security, said the Syrian Electronic Army's methods are straightforward: They rely on a phishing e-mail with a link to a spoofed Web page that in some cases looks like Google Apps, and is able to yank an employee's credentials fairly easily.

"However, some old tricks are good ones, and until we actually educate users to think before they click, these attacks will continue to be successful," Pickering told us. "There are vast architectural changes we could make to the Internet to make this happen, or we could all follow one simple policy: Don't enter your password on a link you followed from e-mail. If you get a notification from somewhere, just go to the site itself via your browser. It will cost you an extra 10 seconds of typing, but I promise it's worthwhile."

People tend to reuse passwords, Pickering said, so tactics like this are easy and effective. Once hackers have access to e-mail, he said, injecting malware into a network by using internal e-mails as a carrier is exceptionally effective. And it only takes one weak link to begin a chain of several attacks.

"I wish I could say the SEA was doing something deeply complicated, but the real story is they keep burning these companies with tactics that are well established and well known," Pickering said. "That's why we see a significant amount of users using our products for phishing research, and to help train employees to not click on everything that enters their inbox. It's still a real issue out there."

A String of Hack Attacks

Last month, the Syrian Electronic Army hacked The Guardian, another U.K.-based newspaper. The hackers targeted The Guardian's Twitter account.

Hacks of high-profile news organizations' Twitter accounts have become so common that the micro-blogging site has sent a memo to them that warns it expects still more, and outlines several steps the organizations should take to deter the hacks.

"These incidents appear to be spear phishing attacks that target your corporate e-mail," the memo says. It lists several steps that should be taken immediately, along with others for the longer term.

"Change your Twitter account passwords," is one of the immediate steps the memo urges. "Never send passwords via e-mail, even internally. Ensure that passwords are strong -- at least 20 characters long. Use either randomly-generated passwords (like 'LauH6maicaza1Neez3zi') or a random string of words (like 'hewn cloths titles yachts refine')."

Among the longer-term changes Twitter urges for news organizations is to dedicate a single computer solely for posting tweets.

"Don't use this computer to read e-mail or surf the Web, to reduce the chances of malware infection," the memo says.

Twitter is working on beefing up its own security with a two-step authentication system for logging in, but has not yet implemented the system.
 

Tell Us What You Think
Comment:

Name:



Your Next Generation Data Center Is Here! Vblock™ Systems: the world's most advanced converged infrastructure are built on the Cisco Unified Computing System with Intel® Xeon® processors. Vblock™ Systems deliver extraordinary time to market, ROI and TCO, and flexibility to meet your continually changing demands with 5X faster deployment, 96% less downtime, and 1/2 the cost. Click here to learn more.


 Network Security
1.   Michaels: Nearly 3M Cards Breached
2.   Heartbleed Could Cost Millions
3.   Google Street View Unravels CAPTCHAs
4.   Teen Arrested for Heartbleed Hack
5.   IBM Adds Disaster Recovery to SoftLayer


advertisement
Michaels: Nearly 3M Cards Breached
But the hack has been contained.
Average Rating:
Heartbleed Could Cost Millions
But it could have been prevented.
Average Rating:
Don't Reset Passwords for Heartbleed?
Added caution needed to ensure security.
Average Rating:


advertisement
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Michaels Says Nearly 3M Credit, Debit Cards Breached
Arts and crafts retail giant Michaels Stores has confirmed that a data breach at its POS terminals from May 2013 to Jan. 2014 may have exposed nearly 3 million customer credit and debit cards.
 
Heartbleed Could Cost Millions, Could Have Been Prevented
Early estimates of Heartbleed’s cost to enterprises are running in the millions. The reason: revoking all the SSL certificates the bug leaked will come at a very hefty price.
 
Google's Street View Software Unravels CAPTCHAs
The latest software Google uses for its Street View cars to read street numbers in images for Google Maps works so well that it also solves CAPTCHAs, those puzzles designed to defeat bots.
 

Enterprise Hardware Spotlight
Vaio Fit 11A Battery Danger Forces Recall by Sony
Using a Sony Vaio Fit 11A laptop? It's time to send it back to Sony. In fact, Sony is encouraging people to stop using the laptop after several reports of its Panasonic battery overheating.
 
Continued Drop in Global PC Shipments Slows
Worldwide shipments of PCs fell during the first three months of the year, but the global slump in PC demand may be easing, with a considerable slowdown from last year's drops.
 
Google Glass Finds a Home in Medical Education, Practice
Google Glass may find its first markets in verticals in which hands-free access to data is a boon. Medicine is among the most prominent of those, as seen in a number of Glass experiments under way.
 

Mobile Technology Spotlight
Google Releases Chrome Remote Desktop App for Android
You're out on a sales call, and use your Android mobile device to grab a file you have back at the office on your desktop. That's a bit easier now with Google's Chrome Remote Desktop app for Android.
 
Amazon 3D Smartphone Pics Leaked
E-commerce giant Amazon is reportedly set to launch a smartphone after years of development. Photos of the phone, which may feature a unique 3D interface, were leaked by tech pub BGR.
 
Zebra Tech Buys Motorola Enterprise for $3.45B
Weeks after Lenovo bought Motorola Mobility’s assets from Google for $2.91 billion, Zebra Technologies is throwing down $3.45 billion for Motorola’s Enterprise business in an all-cash deal.
 

Navigation
NewsFactor Network
Home/Top News | Enterprise I.T. | Cloud Computing | Applications | Hardware | Mobile Tech | Big Data | Communications
World Wide Web | Network Security | Data Storage | Small Business | Microsoft/Windows | Apple/Mac | Linux/Open Source | Personal Tech
Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters | XML/RSS Feed

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.