Syrian Electronic Army Takes Credit For News Site Hacking 24
New submitter ddtmm writes The Syrian Electronic Army is claiming responsibility for the hacking of multiple news websites, including CBC News. Some users trying to access the CBC
website reported seeing a pop-up message reading: "You've been hacked by the Syrian Electronic Army (SEA)." It appears the hack targeted a network used by many news organizations and businesses.
A tweet from an account appearing to belong to the Syrian Electronic Army suggested the attacks were meant to coincide with the U.S. Thanksgiving on Thursday. The group claimed to have used the domain Gigya.com, a company that offers businesses a customer identity management platform, to hack into other sites via GoDaddy, its domain registrar. Gigya is "trusted by more than 700 leading brands," according to its website. The hacker or hackers redirected sites to the Syrian Electronic Army image that users saw. Gigya's operations team released a statement Thursday morning saying that it identified an issue with its domai registrar at 6:45 a.m. ET. The breach "resulted in the redirect of the Gigya.com domain for a subset of users," the company said. Among the websites known to be hacked so far are New York Times, Chicago Tribune, CNBC, PC World, Forbes, The Telegraph, Walmart and Facebook.
Threat level alpha omega (Score:2)
I haven't really heard of them, but apparently they are a thing. http://en.wikipedia.org/wiki/Syrian_Electronic_Army [wikipedia.org]
Re: (Score:2)
http://sea.sy/article/id/2048/... [sea.sy]
Re: (Score:1)
This is script-kiddie level of hacking, and nothing to really be concerned about.
Point 1: None of the news sites were hacked, and the browsers were redirected using javascript inserted into an advertising unit
Point 2: Only people "logged in" to said news sites saw it. Thus the implication of the user management.
Any actual "hacking" was isolated to one site, the site being used by all these news sites user management. This is akin to the same kind of malware "update your flash player" redirects. The problem
Re: (Score:2)
Re: (Score:1)
Probably they get to write it up as a victory in their funding request. Either that, or somebody drastically overestimated the effect it would have--But they got it wrong in a few ways. (I will not speculate on exactly how. Certain discussions are better not shared with, you know, the Syrian Electronic Army when they happen across slashdot.)
There are lots of targets that would be really smart to go after if you wanted to get the attention of the average american and/or hurt the US markets. But this op..
Oprahs site got hacked as well (Score:2)
http://www.oprah.com/ [oprah.com]
Since hours actually and seems no one has noticed there yet or they are unable to fix it, or I get a cashed version of the site.
(And please don't ask me why I visited that site ;) )
The Independent hacked too (Score:2)
http://www.independent.co.uk/n... [independent.co.uk]
(how could I not click on that one?)
Hack relies on Javascript.
evil shit (Score:2)
A "customer identity management platform".
That means, you're not the consumer, your the consumable. Could it sound any more sinister?
Re: (Score:3)
because the enemy of Syria is in fact Qatar's allies, like the US, the UK and Turkey.
Qatar want a gas pipeline to Europe. Turkey doesn't want it passing through its Eastern desert region. Qatar already has installation rights guaranteed by US occupation forces in Kuwait and Iraq. Syria told Qatar in not so many words to politely fuck off, they're not planting a pipeline through some of the most fertile arable land in the Middle East, so Qatar asked its allies (the US and the UK) to install a pretext to aggr
Re: (Score:2)
Re: (Score:2)
offer counterargument instead of simply gainsaying, or your words fall in the same place as any AC. Into the bin with ye.
Too bad Canadian Thanksgiving is long past (Score:2)
Syrian Electronic Army hacked DNS provider .. (Score:1)