Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Wednesday, 7 June, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Telegraph pulled social media buttons during SEA attack

by The Gurus
December 2, 2014
in Editor's News
Share on FacebookShare on Twitter

The Telegraph disabled its social media sharing buttons during the attack by the Syrian Electronic Army (SEA).
 
According to a source who chose to remain anonymous, there was a suggestion that those services were being used to hijack the news websites. “Most of the sites affected use Gigya for comments, but we use Disqus, so it cannot have been that in [this] case,” they said.
 
The source said that the widgets were switched off and unavailable during the attack, in a possible attempt to stop the effort. A spokesperson for the Telegraph said: “As this functionality is not essential to the delivery of our sites, it was decided that the links would be temporarily removed to provide the cleanest and best experience for our customers.”
 
Andrew Barratt, CEO of Coalfire, suggested that this action may have been taken as social media buttons have been a cross-site scripting vector in the past, which has led to social spamming, and it is often used as first point to start attacking social media credentials in order also.
 
Steve Lord, technical director of Mandalorian, said that it appears that the Telegraph does use Gigya and are still using it to power the social media widgets. “That’s why it would’ve been turned off,” he said.
 
As many as 100 websites were affected by the DNS redirect, which was enabled by changing the domain name server (DNS) settings of the shared website provider. Gigya confirmed to the BBC that the hackers had mounted the attack by changing its domain name system entry and by changing some of Gigya’s domains, which were registered with GoDaddy. This enabled the hackers to redirect visitors to their own webpages, or alternatively activate pop-up messages.
 
Jason Steer, director of technology at FireEye, told IT Security Guru that for DNS registrars, it could be catastrophic given everything is reliant upon it these days. “I am shocked at how easy it was for them to redirect the DNS and luckily for them, the SEA don’t have any ulterior motive than to promote Assad,” he said.
 
He said he expected that websites such as the Telegraph would have the fundamental security basics done, especially where there is interaction with users.
 
Steer suspected that Gigya was the target as a lot of people were off work in the US due to Thanksgiving, but what did not understand was how some websites were redirected to Javascript and some to a page. “It seems that there is not one consistent theme to what happened, and I am confused as to why there are two directions,” he said.

FacebookTweetLinkedIn
Tags: attackSocial Media
ShareTweet
Previous Post

Cyber Insurance: the immature market set for "significant increase"

Next Post

FIN4 group used social engineering to hit M&A targets

Recent News

Standard post, logos of brands, headshot.

J Brand: The Challenges of Putting Mental Health First in an Unfamiliar Industry

June 6, 2023
iPad with Anxiety written on it in capitals.

Half of UK Employees Suffer From “Sunday Scaries”

June 6, 2023
UK Organisations lack clear path to achieve threat intelligence

UK Organisations lack clear path to achieve threat intelligence

June 6, 2023
A Roadmap for Becoming a Penetration Tester in 2023

A Roadmap for Becoming a Penetration Tester in 2023

May 31, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information