Attacks/Breaches
4/23/2013
11:10 AM
Connect Directly
RSS
E-Mail
50%
50%

Twitter Battles Syrian Hackers

Hacking group Syrian Electronic Army seizes CBS Twitter accounts and publishes links to websites that infect visitors with malware.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
[ Update: The Syrian Electronic Army claimed credit for hacking the Associated Press Twitter account Tuesday afternoon. About 1 p.m. ET, a faked post on AP's Twitter's feed claimed two explosions in the White House had injured President Barack Obama. AP suspended its Twitter account and said in a statement, "The AP twitter account has been hacked. A tweet about an attack at the White House is false. We will advise on acct. status." White House spokesman Jay Carney confirmed that the White House had not been attacked and said "the president is fine." ]

The hackers Syrian Electronic Army Saturday seized control of multiple CBS Twitter accounts, posting messages that redirected to malicious websites that launched drive-by attacks at browsers. Twitter responded by suspending the affected accounts and returning them to their rightful operators. Then it suspended the hacking group's own Twitter feed.

In response, the Syrian Electronic Army registered a new Twitter account at "@Official_SEA," which Twitter subsequently froze. Cue @Official_SEA3, which Twitter duly shut down, and so on.

By Sunday, the Syrian Electronic Army -- a self-described "virtual army" apparently sympathetic to the regime of Syrian president Bashar al-Assad -- had registered "@Official_SEA6." As of Tuesday, that account remained active, and the group even went as far as to trumpet the new name in a home-cooked YouTube video.

[ Protect your Twitter account. Read 5 Steps To Prevent Twitter Hacks. ]

"But you have to wonder how long before that one is also shut down by Twitter's security team," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

On Monday, a tweet from that account linked to a picture purporting to be a data dump (aka dox) that included the email address, and phone and fax numbers, for Joseph "Sepp" Blatter, president of the worldwide soccer governing body FIFA. The same day, the Syrian Electronic Army also claimed to have taken over the Twitter accounts of both Blatter (@SeppBlatter) and the World Cup (@FifaWorldCup). Tweets from those accounts accused Blatter of corruption and suggested that bribery by officials in Qatar led to the country winning the hosting slot for the 2022 World Cup.

By Tuesday morning, however, both of those accounts had been expunged of the Syrian Electronic Army messages, and appeared to be back in the hands of their rightful operators.

The FIFA account takeovers followed the group's Saturday seizure of the Twitter accounts of both 60 Minutes and the Denver CBS affiliate. "By attacking Syria using terrorists the US regime hopes to bring a world government," read one tweet from the 60 Minutes account. Since the Syrian civil war began two years ago, the United Nations estimates that 70,000 people have died, although critics call that an underestimate.

Some of the tweets distributed from the CBS accounts included links to websites that attempted to launch drive-by exploits of browsers.

CBS officials confirmed the account takeovers Saturday and said the broadcaster was working with Twitter to "resolve the issue," reported The Independent newspaper in Britain.

The Syrian Electronic Army's Twitter account takeovers have largely focused on news targets. Earlier this month, the group claimed credit for taking over the National Public Radio Twitter feed. That followed a March takeover of multiple BBC Twitter accounts, including the weather feed, and posting reports such as "Saudi weather station down due to head-on collision with camel," as well as offensive rants, including some of an anti-Semitic nature. Last year, the group seized control of a Reuters Twitter account, using it to broadcast messages such as, "White house spokesperson says financial and technical support given to #AlQaeda operatives in #Syria."

In the wake of numerous high-profile Twitter account takeovers, security experts continue to urge Twitter users to use complex, unique passwords for the social media site. But they've also called on Twitter to begin offering two-factor authentication for account access, as Apple and Microsoft have recently done, following in the footsteps of Google and Dropbox.

Twitter does appear to be moving in the two-factor authentication direction -- which would block most types of account takeovers -- albeit at its own pace. Earlier this year, notably, the company posted a job advertisement seeking an engineer with expertise in "multifactor authentication and fraudulent login detection."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/29/2013 | 5:49:30 PM
re: Twitter Battles Syrian Hackers
Another attack on a company
that should have the utmost security measures in place. Still they are facing
known attacks and the attacks are getting the best of good old Twitter. It is
comical when you think about it. The Syrian Electronic Army actually has the gall
to try an open Twitter accounts with Twitter the company that they are aggressively
attacking. The ironic thing is that their accounts keep getting shut down, you
would think that by now Twitter would launch a offensive attack against the
hackers to better learn their whereabouts and as much information as they could
gather prior to shutting down their accounts.

Paul Sprague

InformationWeek Contributor
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
4/23/2013 | 7:55:16 PM
re: Twitter Battles Syrian Hackers
Now, where did I read that Twitter had already implemented TFA?
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.