The Times, Twitter Hacked by Syrian Electronic Army

August 28th, 2013

The New York Times was hacked, causing a prolonged website outage on August 27th. The company blames the outage on an attack at the company’s Australia-based domain name registrar, Melbourne IT. The attack also resulted in employees of The Times taking greater care in sending sensitive emails.

The company’s CIO, Marc Frons, was quoted as saying the disruption was the result of an external attack on the registrar by the Syrian Electronic Army, or someone trying “very hard” to impersonate the hacking group. “The Syrian Electronic Army is a group of hackers who support President Bashar al-Assad of Syria,” The Times wrote about the hackers.

Some time after 3 p.m. on Tuesday, the paper’s main site went down. Shortly after being restored, the hackers again took the site down, and it remained largely unavailable for several hours.

The same attack on Melbourne IT that caused problems for The Times may have compromised several other domains as well, including Twitter, Computerworld is reporting. The WHOIS records for Twitter on Tuesday afternoon showed that the Syrian Electronic Army compromised two of Twitter’s domain names, they said.

In an alert, H.D. Moore, chief research officer at security vendor Rapid7, noted that Melbourne IT appears to be the registrar for several other larger companies, including Yahoo, Google, Microsoft, Ikea and AOL. “These other domains show no indication of being compromised, but if the attackers have found a weakness in the Melbourne IT system, these other domains may also be at risk,” Moore wrote.

Chester Wisniewski, a senior security advisor at Sophos, said that the attackers likely gained access to the Australian registrar’s systems and changed the domain name records of The Times so as to redirect traffic bound for the site to a server belonging to the Syrian Electronic Army.

A review of the DNS records for The Times when the site was unavailable on Tuesday afternoon shows the company’s DNS records pointing to systems that appeared to be based in Moscow and in Syria, Wisniewski said.

“If we look at the history of these guys over the last six months they probably phished the name provider,” he said.

Instead of directly attacking the intended target, the Syrian Electronic Army has shown a tendency to go after partners and service providers who might be less well protected, Wisniewski said.

He pointed to a recent website disruption at the Washington Post that appears to have resulted from an attack by the hacking group on content service provider Outbrain. In that incident, the hackers at the Syrian Electronic Army also appeared to try and use their access at Outbrain to compromise CNN, he noted.

“There is no evidence of a DDoS attack related to the ongoing issues with DNS resolution for The New York Times website, nor is there any evidence that DNS cache-poisoning was involved,” said Dan Holden, director of security research at Arbor Networks. “[The] incident appears to be the result of the latest in an apparently ongoing series of high-profile DNS registrar compromises and other operational issues.”

Tuesday’s outage marks the second time this month that the paper’s main website has been taken offline. On August 14, the site was knocked out for more than two hours and then struggled with sluggish performance for two more hours as the result of what the paper described as a technical glitch.

That outage, which also took down The Times‘ mobile application, occurred seconds after a scheduled site maintenance update, the company said at that time. The incident caused some speculation about whether the site had been hacked or had really gone down because of a technical issue as the paper claimed.

In January, The Times disclosed that attackers belonging to a Chinese hacking group had gained access to its networks and systems and remained undetected for four months. The intrusion happened in September 2012, when the paper was doing a story on China’s Prime Minister, Wen Jiabao, The Times noted.

Security experts suggested hackers might have gained an initial foothold on the company’s website via a targeted, specially crafted phishing email.

Source: Computerworld

TITLE

LTI INTRANET LOGIN

SUCCESS!

YOU ARE SUCCESSFULLY LOGGED OUT

WELCOME ,

Thank you for logging into the LTI’s intrantet. You now have access to information only available to LTI employees.

Here you may download useful employee forms, or stay current with the latest company announcements.

Please stay tuned as we will be updating this section with more information.

Please let us know how we can improve your LTI Intranet experience by writing to jpheiner@ltionline.net.

EMPLOYEE LOGIN

Existing Intranet users login here:

EMPLOYEE SIGN-UP

New intranet users register here:

Thank you for registering! You will receive your confirmation shortly.