Tag Archive for: Syrian

Syrian Electronic Army posts hacking message on several news sites

A hacker group called the Syrian Electronic Army (SEA) scared visitors to several news websites on Thursday by posting rogue pop-up messages saying they’d been hacked.

According to reports from users on Twitter the affected sites included those of CNBC, Forbes, the Chicago Tribune, OK magazine, the Evening Standard, PCWorld, The Daily Telegraph and The Independent.

Not all visitors to those sites have seen the pop-up messages, which read “You’ve been hacked by the Syrian Electronic Army (SEA)” and in many cases the incident was reported by mobile users.

SEA does not appear to have actually hacked the affected websites directly, but instead pulled off the attack through Gigya, a customer identity management platform used by a large number of brands. The group posted a screen shot on Twitter from inside the control panel for the Gigya.com domain at GoDaddy, suggesting that they had control over the account.

To read this article in full or to leave a comment, please click here

Network World Security

Microsoft’s No-IP seizure hit Syrian Electronic Army hard – ZDNet


Economic Times

Microsoft's No-IP seizure hit Syrian Electronic Army hard
ZDNet
Among them are the SEA, the controversial Italian lawful intercept vendor the Hacking Team, and Flame, a well-known piece of malware discovered in 2012. SEA is likely to face the most significant difficulties going forward, while others will simply
Microsoft legal action cramping other hacking campaigns, Kaspersky saysPC Advisor
MS No-IP takedown hits 25% of APT attackersSC Magazine UK

all 154 news articles »

flame malware – read more

Syrian Electronic Army uses Taboola ad to hack Reuters (again)

Code dynamically inserted into Reuters web pages by content serving company, Taboola, appears to have been poisoned by the Syrian Electronic Army in order to redirect visitors to another page under the hackers’ control. It highlights the need for websites to consider security in a broad context and to not rely solely on traditional server-based defenses.
Naked Security – Sophos