Attacks/Breaches
8/29/2013
02:54 PM
Connect Directly
RSS
E-Mail
50%
50%

Lessons Learned From N.Y. Times Hack Attack

How could the Times have recovered faster after the Syrian Electronic Army attacked its DNS registry? Here are six considerations to help protect your business from similar harm.

The Syrian Electronic Army: 9 Things We Know
(click image for larger view)
The Syrian Electronic Army: 9 Things We Know
What might The New York Times -- and to a lesser extent, Twitter -- have done differently to prevent Tuesday's hack attack that disrupted access to their sites?

The disruptions began after the Syrian Electronic Army (SEA), a group of hackers that back Syrian President Bashar al-Assad in the country's civil war, hacked into the systems of the world's sixth largest domain name system (DNS) registrar, Melbourne IT, and altered DNS settings for nine sites.

Twitter quickly restored service, but by Thursday afternoon, people were still reporting difficulties accessing the Times website. "If you're still having issues, it's likely the result of your ISP not yet restoring proper DNS records," Times spokeswoman Eileen Murphy tweeted Wednesday.

While those cleanup efforts continue, here's how other businesses can help themselves avoid a similar fate:

1. Beware Spear-Phishing Attacks

According to Melbourne IT chief executive Theo Hnarakis, the SEA was able to hack the affected sites' DNS settings after launching a successful spear-phishing attack against one of Melbourne IT's U.S. resellers, which he declined to name. The phishing attack allowed the hackers to access employees' email, from which they retrieved log-in credentials for both the Times and Twitter DNS configuration pages.

"This activist group used a very, very sophisticated spear phishing attack," Hnarakis told the Associated Press (AP). " They sent very dubious emails to staff of one of our resellers whose area of expertise is looking after the domain names for major corporates including the New York Times."

"Unfortunately, a couple of the staff members of the reseller responded by giving their email log-in details; the group were able to search their emails for sensitive information that included the username and password for The New York Times, and from there it all cascades," he said.

2. Train Users To Spot Phishing Attacks

What could Melbourne IT's reseller have done differently? For starters, it might have better educated employees to recognize and resist phishing attacks. "Humans [are] once again the weakest link," tweeted Brian Honan, CEO of the Irish Reporting and Information Security Service, which is Ireland's CERT, about the hack. "Malware and attackers no longer target the operating systems but the [users] instead."

Unfortunately, attackers only need one phishing attack to be successful, and the odds are on their side. According to a phishing study conducted at North Carolina State University, 89% of participants claimed to be proficient at recognizing malicious emails. But when assessing whether an email was malicious or legitimate, 92% of study participants incorrectly classified at least some emails.

3. Monitor DNS Settings In Real Time

The SEA hacked the DNS settings for both the Times and Twitter, among other sites, yet Twitter emerged relatively unscathed. What was its secret? HD Moore, chief research officer at Rapid7, told Bloomberg that Twitter actively monitors its DNS settings and thus learned of the hack very quickly.

Ben April, a senior threat researcher at Trend Micro, said in a blog post that commercial monitoring services or even "a small shell-script" can do the job, but warned that neither of those approaches will prevent attacks, although "would have shortened the time to repair."

What exactly should businesses monitor? According to Dell SecureWorks' Counter Threat Unit (CTU) research team, watch "for changes to registration information and DNS resolution to IP addresses" on all business-critical domains.

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
David F. Carr
50%
50%
David F. Carr,
User Rank: Apprentice
8/30/2013 | 1:23:15 PM
re: Lessons Learned From N.Y. Times Hack Attack
Is there something website operators can do to get visibility into all the subcontractor relationships between different organizations involved in the management and maintenance of DNS records? Seems like simplifying the chain of command might be one way to minimize the chance of problems like this.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-7877
Published: 2014-10-30
Unspecified vulnerability in the kernel in HP HP-UX B.11.31 allows local users to cause a denial of service via unknown vectors.

CVE-2014-3051
Published: 2014-10-29
The Internet Service Monitor (ISM) agent in IBM Tivoli Composite Application Manager (ITCAM) for Transactions 7.1 and 7.2 before 7.2.0.3 IF28, 7.3 before 7.3.0.1 IF30, and 7.4 before 7.4.0.0 IF18 does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof s...

CVE-2014-3668
Published: 2014-10-29
Buffer overflow in the date_from_ISO8601 function in the mkgmtime implementation in libxmlrpc/xmlrpc.c in the XMLRPC extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) via (1) a crafted first argument t...

CVE-2014-3669
Published: 2014-10-29
Integer overflow in the object_custom function in ext/standard/var_unserializer.c in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an argument to the unserialize function ...

CVE-2014-3670
Published: 2014-10-29
The exif_ifd_make_value function in exif.c in the EXIF extension in PHP before 5.4.34, 5.5.x before 5.5.18, and 5.6.x before 5.6.2 operates on floating-point arrays incorrectly, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly exec...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.