Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Twitter Battles Syrian Hackers

Hacking group Syrian Electronic Army seizes CBS Twitter accounts and publishes links to websites that infect visitors with malware.

Anonymous: 10 Things We Have Learned In 2013
Anonymous: 10 Things We Have Learned In 2013
(click image for larger view and for slideshow)
[ Update: The Syrian Electronic Army claimed credit for hacking the Associated Press Twitter account Tuesday afternoon. About 1 p.m. ET, a faked post on AP's Twitter's feed claimed two explosions in the White House had injured President Barack Obama. AP suspended its Twitter account and said in a statement, "The AP twitter account has been hacked. A tweet about an attack at the White House is false. We will advise on acct. status." White House spokesman Jay Carney confirmed that the White House had not been attacked and said "the president is fine." ]

The hackers Syrian Electronic Army Saturday seized control of multiple CBS Twitter accounts, posting messages that redirected to malicious websites that launched drive-by attacks at browsers. Twitter responded by suspending the affected accounts and returning them to their rightful operators. Then it suspended the hacking group's own Twitter feed.

In response, the Syrian Electronic Army registered a new Twitter account at "@Official_SEA," which Twitter subsequently froze. Cue @Official_SEA3, which Twitter duly shut down, and so on.

By Sunday, the Syrian Electronic Army -- a self-described "virtual army" apparently sympathetic to the regime of Syrian president Bashar al-Assad -- had registered "@Official_SEA6." As of Tuesday, that account remained active, and the group even went as far as to trumpet the new name in a home-cooked YouTube video.

[ Protect your Twitter account. Read 5 Steps To Prevent Twitter Hacks. ]

"But you have to wonder how long before that one is also shut down by Twitter's security team," said Graham Cluley, senior technology consultant at Sophos, in a blog post.

On Monday, a tweet from that account linked to a picture purporting to be a data dump (aka dox) that included the email address, and phone and fax numbers, for Joseph "Sepp" Blatter, president of the worldwide soccer governing body FIFA. The same day, the Syrian Electronic Army also claimed to have taken over the Twitter accounts of both Blatter (@SeppBlatter) and the World Cup (@FifaWorldCup). Tweets from those accounts accused Blatter of corruption and suggested that bribery by officials in Qatar led to the country winning the hosting slot for the 2022 World Cup.

By Tuesday morning, however, both of those accounts had been expunged of the Syrian Electronic Army messages, and appeared to be back in the hands of their rightful operators.

The FIFA account takeovers followed the group's Saturday seizure of the Twitter accounts of both 60 Minutes and the Denver CBS affiliate. "By attacking Syria using terrorists the US regime hopes to bring a world government," read one tweet from the 60 Minutes account. Since the Syrian civil war began two years ago, the United Nations estimates that 70,000 people have died, although critics call that an underestimate.

Some of the tweets distributed from the CBS accounts included links to websites that attempted to launch drive-by exploits of browsers.

CBS officials confirmed the account takeovers Saturday and said the broadcaster was working with Twitter to "resolve the issue," reported The Independent newspaper in Britain.

The Syrian Electronic Army's Twitter account takeovers have largely focused on news targets. Earlier this month, the group claimed credit for taking over the National Public Radio Twitter feed. That followed a March takeover of multiple BBC Twitter accounts, including the weather feed, and posting reports such as "Saudi weather station down due to head-on collision with camel," as well as offensive rants, including some of an anti-Semitic nature. Last year, the group seized control of a Reuters Twitter account, using it to broadcast messages such as, "White house spokesperson says financial and technical support given to #AlQaeda operatives in #Syria."

In the wake of numerous high-profile Twitter account takeovers, security experts continue to urge Twitter users to use complex, unique passwords for the social media site. But they've also called on Twitter to begin offering two-factor authentication for account access, as Apple and Microsoft have recently done, following in the footsteps of Google and Dropbox.

Twitter does appear to be moving in the two-factor authentication direction -- which would block most types of account takeovers -- albeit at its own pace. Earlier this year, notably, the company posted a job advertisement seeking an engineer with expertise in "multifactor authentication and fraudulent login detection."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
PJS880
50%
50%
PJS880,
User Rank: Ninja
4/29/2013 | 5:49:30 PM
re: Twitter Battles Syrian Hackers
Another attack on a company
that should have the utmost security measures in place. Still they are facing
known attacks and the attacks are getting the best of good old Twitter. It is
comical when you think about it. The Syrian Electronic Army actually has the gall
to try an open Twitter accounts with Twitter the company that they are aggressively
attacking. The ironic thing is that their accounts keep getting shut down, you
would think that by now Twitter would launch a offensive attack against the
hackers to better learn their whereabouts and as much information as they could
gather prior to shutting down their accounts.

Paul Sprague

InformationWeek Contributor
AustinIT
50%
50%
AustinIT,
User Rank: Apprentice
4/23/2013 | 7:55:16 PM
re: Twitter Battles Syrian Hackers
Now, where did I read that Twitter had already implemented TFA?
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).