S.E.A. vs. ASA – Syrian Electronic Army Cyber-Attacks NYTimes.com, Twitter

SEA, NYTimes, Twitter, Hacktivist, cyber attack, cisco asa, adaptive security appliance, internet security, firewall

This is why Internet security is more imperative than ever.

Just yesterday, an electronic hacktivist group known as the S.E.A. (Syrian Electronic Army) seemingly compromised both The New York TImes’ and Twitter’s websites.

It started around late afternoon yesterday, when Forbes and Gawker began posting about the incident. Apparently, upon visiting NYTimes.com, some users found an ominous screenshot of an SEA emblem and a declaration that the page was “Hacked by Syrian Electronic Army.” Eileen Murphy, a spokeswoman for the world-famous news publication tweeted that yes, this was likely an external malicious attack.

Twitter, who has been the victim of recent SEA cyber attacks–including the hijacking of BBC, 60 Minutes, AP, and Reuters feeds–was targeted once again and fell victim yesterday as well. This time, DNS records for their image server, twimg.com, were compromised and renamed to state “sea@sea.sy” as being the admin. This caused image-serving requests to be sent to someone else’s server. Thankfully, the hacktivists were not able to redirect Twitter’s main server traffic:

It was then announced later on that the Times’ DNS (domain name server) registrar was attacked, a company called Melbourne IT; this is the same registrar that Twitter uses. So, because Melbourne IT was hacked, SEA had access to both Twitter and NYTimes DNS records.

The SEA are what the NYTimes defines as “a hacker collective that supports the Syrian president, Bashar, al-Assad” (via NYTimes.com). One of the more recent tweets coming from the above account states that “the @nytimes attack was going to deliver an anti-war message but our server couldn’t last for 3 minutes #SEA.” Whatever the case, two very powerful and influential online media outlets were just hijacked in the same day, allegedly from another country.

At planIT HARDWARE, we sell Cisco ASA’s (adaptive security appliances) and similar units, to provide any datacenter or business with a reliable piece of IT security hardware. As the manufacturer puts it, ASA’s “deliver a robust suite of highly integrated, market-leading security services for small and medium-sized businesses (SMBs), enterprises, service providers, and mission-critical data centers- in addition to providing unprecedented services flexibility, modular scalability, feature extensibility, and lower deployment and operations costs.” Our units are sturdy and reliable and just what you need to keep a secure server going in your business.

So, whether you’re a vendor or an SMB looking for reliable hardware, remember: it’s always smart to wear protection.

Careful…Cyber-Attacks Are Serious! Firewalls Are Important!

asa, cisco asa, cisco systems, firewall, it hardware, man of steel, open source, supermanThe Internet really is a dangerous place.

I think we like to imagine the Internet as this Man of Steel, an impenetrable powerhouse…

Yesterday, I was in a used record/book/movie store by my house. I had never been but had always been interested in checking it out. When I found my way to the back of the store, I was lost in a whole world of comic books, superhero anthologies and novelizations and origin stories. I turned to my friend and said, “You know, there’re so many issues and subplots and alternate universes and origin stories….it’s almost too late to keep up with any of this.” We headed for the anthologies and I immediately sought out Superman, my favorite of the classic superheroes. I grew frustrated as I scanned pages and covers because The Man of Steel, perhaps moreso than his peers, has been made to be this open source of sorts: his origins, his powers (ice breath, fire-blasting eyes, super-speed, super…anything anyone felt like tacking on)–even his hairhave been altered and added to over the years. But for all his strength and increasing multitude of abilities, his weakness has always been the substance, Kryptonite. The same goes for the powers of the (once-called) World Wide Web.

As the Internet has grown to be an open-source free market, its uses and functions have evolved and progressed at a rapid rate. Generations are being brought up in a world where there is no “pre-web.” It’s like having a gargantuan city bank, laboratory, record store–you name it–that everyone can fit in to and interact within. But as with all freedoms, some security is necessary to ensure those liberties are not abused. Firewall security was invented to accept or block incoming signals on a system’s network, based on what that particular network’s security policy defines as acceptable or blockable.

planIT HARDWARE has a whole range of Adaptive Security Appliances from Cisco along with other IT hardware that will ensure that your business’ network is secure from cyber-thieves.

No matter how strong “the Interwebs” is, no matter how many functions it may serve, it will always be vulnerable. There will always be that┬áKryptonite┬áto penetrate its forces. Just take a look in the news at the cyber battle between South and North Korea and you’ll see what I mean. There have been many efforts to strengthen the durability of the Internet, but there are clearly a few weak spots. If you own a business, get your network on-point and secure!


Have Questions?