اخر الأخبار

اعلان

حمل القالب من عالم المدون

Sunday, 22 June 2014

اختراق الجيش الاليكترونى السورى لموقع رويترز

ليست  المرة الاولى التى يقوم كراكرز الجيش السورى باختراق رويترز حيث قام الجيش الاليكترونى السورى باختراق رويترز وترك رسالة يقول فيها اى شخص سيحاول تزوير قصة زيارة لسوريا سوف يتم اختراق موقعه وتوجيه زوار موقعة للصفحة التى نحددها له
Earlier today, Reuters was compromised by the Syrian Electronic Army. It isn’t the first time that occurs. Anyone who would visit try to visit a story about Syria, would be redirected to a page hosted by the Syrian Electronic Army.

   This page

was redirected to this page

 

So, the question is? How did they do it?

News organisations have been repeatedly targeted by the Syrian Electronic Army “for spreading lies about Syria”. The list of organizations that were compromised by SEA phishing attacks is really long. Most organizations did deploy some new security components such as two-step authentication to prevent such attacks from happening.

Reuters was not compromised this time. Instead, probably frustrated of not being able to trick Reuters employees into their phishing schemes, they went after a third-party advertising network that dynamically loads code into the Reuters website to display their recommendations. The name of that provider is the New York-based Taboola.
Proof that the Taboola CDN was delivering the redirection

It is still unclear how Taboola was compromised but given SEA’s track record, phishing would be my first guess.

As many of the previously compromised organizations, Taboola uses Google Apps. The Syrian Electronic Army has repeatedly used their Google phishing templates to trick users into giving up their passwords. The Onion did a (serious) review of how they got tricked, I strongly recommend you to read it.
By compromising Taboola, the value of the compromise is significantly higher than just compromising Reuters. Taboola has 350 million unique users and has partnerships with world’s biggest news sites including Yahoo!, the BBC, FoxNews, the New York Times… Any of Taboola’s clients can be compromised anytime now.

What this means for system administrators

If you’re using 3rd party analytics or advertising networks, your website’s security relies on the weakest of those since any of them is able to take over your website (and potentially steal your user’s data or trick them into installing malware). Websites like Reuters use more than 30 of these services and thus expose a considerable attack surface.
Reuters’s 3rd party providers. Generated with Disconnect.

Preventing such attacks in the future

As a user, you can block advertising and analytics websites by installing a browser extension such as Disconnect. Not only does it protect you from obsessive tracking on the Internet but it also keeps you safer while surfing!
As a system administrator, you have to minimize the number of 3rd party providers you need to trust. Additionally, since phishing seems to be so effective on most non-technical people, you should deploy two-factor authentication. If Taboola’s system administration had enforced 2-step auth in Google Apps, it would probably not have happened.

hubk

حمل القالب من عالم المدون