hackers

Pro-Palestinian hacktivists hit security sites

Warwick Ashford

Pro-Palestinian hacktivists affiliated with online collective Anonymous have attacked the websites of two IT security firms and a mobile messaging service.

The hacktivists seized control of domain name system (DNS) records and redirected traffic for websites belonging to AVG, Avira and WhatsApp to pro-Palestinian messages, according to The Guardian.

hacking.jpg

The group, calling itself Kdms, claimed responsibility for the attacks on Twitter.

The DNS poisoning was enabled by a hack of domain name registrar and website hosting company Network Solutions using a bogus password-reset request.

DNS records provide a routing lookup for the internet and by assuming control of the DNS, hackers are able to redirect traffic to websites under their control.

DNS poisoning attacks have become increasingly popular as websites have improved security, forcing attackers to look for vulnerabilities in third-party suppliers to the target.

The New York Times and Twitter were hit by a DNS attack in August by another hacktivist group known as the Syrian Electronic Army.

The three websites have been recovered, but propagation of the corrected DNS routing across the internet could take days.

Commenting on the New York Times attack, Barry Shteiman, senior security strategist at Imperva, said the incident highlighted a prolonged security problem inherited in the way that companies rely on third-party public services to conduct their business.

“While a company like NYT may be able to secure their own platforms, harden their systems and regularly check for vulnerable components on premise, it is a much harder practice when some of that infrastructure is provided by a third-party like an ISP [internet service provider] or a DNS host,” he said.

According to Shteiman, CIOs need to realise that critical pieces of their online entities are controlled by suppliers and that security policies should apply to them as well.

“Companies should create contingency plans and check the security measurements taken by their third-party content and infrastructure providers. A DNS host is, unfortunately, a great example,” he said.


Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
 

COMMENTS powered by Disqus  //  Commenting policy