Attacks/Breaches
5/16/2013
12:04 PM
Connect Directly
RSS
E-Mail
50%
50%

Who Is Syrian Electronic Army: 9 Facts

Syrian hackers claim to battle American imperialism, media bias and Angelina Jolie.
Previous
6 of 9
Next


Is the Syrian Electronic Army based in Syria? After Syria reestablished its Internet connection last week -- following a blackout that lasted approximately 24 hours -- security experts wondered when the hackers might resume their attacks.

With that question floating around the Internet, the group responded: "But wait ... we are in Dubai!" read a tweet from the @Official_SEA12 Twitter account.

The Dubai quip was made in response to the aforementioned Guardian report last month that "according to defectors from inside its ranks, the group moved last year from Damascus to a secret base in Dubai."

The group's members later clarified that they were in Syria, and had been affected by the Internet outage. "Unfortunately it is true, though mobile phones worked intermittently due to a large number of Syrians using them as an alternate form of communication," said the Shadow. "These kinds of cuts do not affect the terrorists operating in Syria as they have their own US-supplied communication equipment. The blackout effectively shut down our operations, we are glad to be back."

Ditto, no doubt, for an eight-hour blackout that -- according to data provided by Arbor Networks -- began at about 8:30 a.m. Eastern Time on May 15, and lasted until just after 4 p.m. The cause of the blackout isn't known, although Internet monitoring firms suspect last week's blackout was due to the civil-war-torn country's weak infrastructure.

Zones of control in Syria courtesy of Wikipedia.

RECOMMENDED READING

Anonymous OpUSA Hackathon: Mostly Bluster

Twitter Battles Syrian Hackers

Twitter Preps Two Factor Authentication After AP Hoax

How Syrian Electronic Army Unpeeled The Onion

Syrian Hacktivists Hit Guardian Twitter Feeds

Syria Back Online After Internet Blackout

Previous
6 of 9
Next
Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2009-5142
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb 1.09 and earlier, as used in Mimbo Pro 2.3.1 and other products, allows remote attackers to inject arbitrary web script or HTML via the src parameter.

CVE-2010-5302
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in timthumb.php in TimThumb before 1.15 as of 20100908 (r88), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via the QUERY_STRING.

CVE-2010-5303
Published: 2014-08-21
Cross-site scripting (XSS) vulnerability in the displayError function in timthumb.php in TimThumb before 1.15 (r85), as used in multiple products, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to $errorString.

CVE-2014-0965
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted SOAP response.

CVE-2014-3022
Published: 2014-08-21
IBM WebSphere Application Server (WAS) 7.0.x before 7.0.0.33, 8.0.x before 8.0.0.9, and 8.5.x before 8.5.5.3 allows remote attackers to obtain sensitive information via a crafted URL that triggers an error condition.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.