Tuesday 30 April 2013

Cyber attack on western media

Pro-Assad Syrian hackers launching cyber-attacks on western media
Syrian Electronic Army claims responsibility for attack on Guardian and other organisations

29 April, 2013

The Guardian has come under a cyber-attack from Syrian hackers who have targeted a series of western media organisations in an apparent effort to cause disruption and spread support for President Bashar al-Assad's regime.

The Syrian Electronic Army (SEA) claimed responsibility for the weekend Twitter attack on the Guardian, having previously targeted the BBC, France 24 TV, and National Public Radio in the United States.

Other recent victims have included the broadcaster al-Jazeera, the government of Qatar, and Sepp Blatter, the president of football's governing body Fifa, whose Twitter account was hacked.

Last week the SEA successfully attacked the Associated Press news agency, whose Twitter account was temporarily breached, allowing the group to send bogus messages which wreaked havoc on stock exchanges. The hackers tweeted that President Obama had been injured in a bomb attack at the White House, causing a temporary 143-point drop on the Dow Jones industrial average.

Cybersecurity experts say the SEA attacks are designed to disrupt and embarrass, and the group will likely target any site that might give it an opportunity to spread propaganda for Assad.

Analysts and western intelligence agencies are increasingly sure the SEA, which emerged two years ago, is essentially a proxy for an administration that has been widely condemned over its brutal efforts to quell an internal uprising.

Though many of the SEA's victims appear to have been chosen randomly, the group appears to have prioritised western media organisations in recent weeks.

"The aim of the SEA is to generate publicity," said one analyst. Last month the SEA hacked into the Twitter accounts associated with BBC weather, BBC Arabic Online and BBC Radio Ulster accounts.

Nine bogus tweets were broadcast in an hour, including some with anti-Israeli sentiments, and others saying "Long Live Syria", and the "Syrian Electronic Army Was Here".

Guardian journalists have reported from inside Syria over the last two years, highlighting the terrible toll the civil war has had on the country's people, and atrocities blamed on the regime as it attempts to quell a rebellion. It also published a number of leaked emails from the Assads and their inner circle.

Hours after the cyber-attack began, the SEA said it has targeted the Guardian for spreading "lies and slander about Syria" and said it was in a "state of war with the security team of Twitter".

The Guardian first recognised it was being targeted over the weekend when spoof emails were sent to staff encouraging them to click on links that could compromise some of the company's email and social media accounts. Later, several of the Guardian's Twitter feeds – including GuardianBooks, GuardianTravel and guardianfilm – were broken into.

The technique is regarded as a classic, if crude, "phishing" attack – where individuals are tricked into giving away details that might allow hackers to gain access to sensitive information or allow them to control systems such as Twitter feeds.

The attack was quickly identified and is in the process of being dealt with. The Guardian has since discovered the attack originated from Internet Protocol (IP) addresses within Syria.

Syrian opposition activists say Assad's cousin Rami Makhlouf bankrolls the SEA, which recently moved from Syria to a secret office in Dubai.

Makhlouf pays the pro-regime hackers for their activities, and they typically earn $500-$1,000 for a successful attack. They also get free accommodation and food. Sometimes Syrian government officials tell the SEA which western sites to hack; on other occasions the SEA selects its own targets.

A Guardian News & Media spokesperson said on Monday: "We are aware that a number of Guardian Twitter accounts have been compromised and we are working actively to resolve this."

No comments:

Post a Comment

Note: only a member of this blog may post a comment.